mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2023-06-27T18:00:32.630488+00:00
This commit is contained in:
parent
a24715143f
commit
97bcba6c6a
@ -2,19 +2,76 @@
|
||||
"id": "CVE-2020-21174",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-20T15:15:11.030",
|
||||
"lastModified": "2023-06-20T15:49:08.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-27T17:35:02.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "File Upload vulenrability in liufee CMS v.2.0.7.1 allows a remote attacker to execute arbitrary code via the image suffix function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:feehi:feehicms:2.0.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BDECBF4-6272-4580-9B44-B2D6EDFF0DE0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/liufee/cms/issues/44",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,76 @@
|
||||
"id": "CVE-2020-21246",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-20T15:15:11.073",
|
||||
"lastModified": "2023-06-20T15:49:08.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-27T17:33:03.503",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in YiiCMS v.1.0 allows a remote attacker to execute arbitrary code via the news function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yiicms_project:yiicms:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE5A8EB2-1DFA-4832-A074-31866A7B7CDE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yongshengli/yiicms/issues/6",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,75 @@
|
||||
"id": "CVE-2020-21252",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-20T15:15:11.117",
|
||||
"lastModified": "2023-06-20T15:49:08.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-27T17:32:35.853",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Request Forgery vulnerability in Neeke HongCMS 3.0.0 allows a remote attacker to execute arbitrary code and escalate privileges via the updateusers parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hongcms_project:hongcms:3.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B8D6DB5-CC3D-4315-92A2-72E06A9AB4F3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Neeke/HongCMS/issues/13",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-30203",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-27T14:15:09.667",
|
||||
"lastModified": "2023-06-27T14:15:09.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-30205",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-27T14:15:09.737",
|
||||
"lastModified": "2023-06-27T14:15:09.737",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0823",
|
||||
"sourceIdentifier": "security@zyxel.com.tw",
|
||||
"published": "2022-06-09T16:15:08.160",
|
||||
"lastModified": "2022-06-15T16:04:26.180",
|
||||
"lastModified": "2023-06-27T16:10:09.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0833",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-03-28T18:15:09.893",
|
||||
"lastModified": "2022-04-04T18:08:41.407",
|
||||
"lastModified": "2023-06-27T16:38:36.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,8 +65,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0871",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-03-11T12:15:07.667",
|
||||
"lastModified": "2022-03-22T13:44:09.813",
|
||||
"lastModified": "2023-06-27T16:40:25.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,7 +92,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0932",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-03-11T15:15:09.857",
|
||||
"lastModified": "2022-03-18T15:54:05.863",
|
||||
"lastModified": "2023-06-27T16:40:05.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,7 +92,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0952",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-05-02T16:15:08.637",
|
||||
"lastModified": "2022-05-09T17:23:54.613",
|
||||
"lastModified": "2023-06-27T16:21:53.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,8 +65,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0959",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-03-16T15:15:16.213",
|
||||
"lastModified": "2022-03-28T13:20:38.540",
|
||||
"lastModified": "2023-06-27T16:39:57.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -68,6 +68,10 @@
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1052",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-03-24T13:15:07.837",
|
||||
"lastModified": "2022-03-31T18:56:17.973",
|
||||
"lastModified": "2023-06-27T16:39:05.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,7 +92,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1077",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2022-03-29T06:15:07.507",
|
||||
"lastModified": "2022-04-04T20:02:18.787",
|
||||
"lastModified": "2023-06-27T16:38:28.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-425"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1092",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-04-25T16:16:08.310",
|
||||
"lastModified": "2022-05-12T14:14:31.857",
|
||||
"lastModified": "2023-06-27T16:22:04.763",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,8 +65,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1203",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-05-30T09:15:09.050",
|
||||
"lastModified": "2022-11-16T17:23:21.230",
|
||||
"lastModified": "2023-06-27T16:13:49.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,8 +65,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1238",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-04-06T10:15:08.200",
|
||||
"lastModified": "2022-04-14T14:45:15.603",
|
||||
"lastModified": "2023-06-27T16:38:13.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -87,8 +87,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1256",
|
||||
"sourceIdentifier": "psirt@mcafee.com",
|
||||
"published": "2022-04-14T15:15:07.943",
|
||||
"lastModified": "2022-04-23T02:22:18.863",
|
||||
"lastModified": "2023-06-27T16:22:23.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,8 +85,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@mcafee.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@mcafee.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1511",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-04-28T15:15:09.637",
|
||||
"lastModified": "2022-05-06T18:56:42.457",
|
||||
"lastModified": "2023-06-27T16:22:00.897",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,7 +92,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1516",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-05-05T15:15:07.953",
|
||||
"lastModified": "2022-12-08T20:02:48.387",
|
||||
"lastModified": "2023-06-27T16:21:46.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1570",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-06-08T10:15:09.790",
|
||||
"lastModified": "2022-06-15T14:39:34.643",
|
||||
"lastModified": "2023-06-27T16:13:22.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,8 +65,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1589",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-05-30T09:15:10.157",
|
||||
"lastModified": "2022-06-08T15:22:13.977",
|
||||
"lastModified": "2023-06-27T16:13:43.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,8 +65,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1598",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-06-08T10:15:09.953",
|
||||
"lastModified": "2022-06-15T15:15:27.637",
|
||||
"lastModified": "2023-06-27T16:13:17.203",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,8 +65,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-1629",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-05-10T14:15:08.530",
|
||||
"lastModified": "2023-05-03T12:15:22.957",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-06-27T16:21:30.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -164,7 +164,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/28",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/41",
|
||||
@ -207,7 +211,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202305-16",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213488",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1649",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-05-10T17:15:07.993",
|
||||
"lastModified": "2022-05-16T16:27:22.627",
|
||||
"lastModified": "2023-06-27T16:20:42.480",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,7 +92,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1661",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2022-06-02T14:15:33.070",
|
||||
"lastModified": "2022-06-09T19:36:15.897",
|
||||
"lastModified": "2023-06-27T16:13:26.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,8 +85,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1714",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-05-13T15:15:08.733",
|
||||
"lastModified": "2022-05-23T18:35:39.780",
|
||||
"lastModified": "2023-06-27T16:18:34.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,7 +92,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-1769",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-05-17T17:15:08.153",
|
||||
"lastModified": "2023-05-03T12:15:28.663",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-06-27T16:18:28.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -169,7 +169,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/28",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/41",
|
||||
@ -227,7 +231,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202305-16",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213488",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1810",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-05-23T12:16:16.490",
|
||||
"lastModified": "2022-05-30T00:33:26.277",
|
||||
"lastModified": "2023-06-27T16:17:50.367",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,7 +92,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-1811",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-05-23T16:16:06.963",
|
||||
"lastModified": "2022-06-02T22:57:49.140",
|
||||
"lastModified": "2023-06-27T16:14:48.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,7 +92,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20683",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2022-04-15T15:15:12.667",
|
||||
"lastModified": "2022-04-26T18:25:27.013",
|
||||
"lastModified": "2023-06-27T16:22:11.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,7 +92,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20699",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2022-02-10T18:15:08.980",
|
||||
"lastModified": "2022-05-12T19:36:43.907",
|
||||
"lastModified": "2023-06-27T16:37:59.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-17",
|
||||
@ -96,7 +96,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2019",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2022-06-09T16:15:08.753",
|
||||
"lastModified": "2022-06-15T17:37:09.397",
|
||||
"lastModified": "2023-06-27T16:09:57.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2062",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-06-13T12:15:08.107",
|
||||
"lastModified": "2022-06-17T19:30:02.763",
|
||||
"lastModified": "2023-06-27T16:09:47.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,7 +92,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39081",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-01-04T10:15:10.707",
|
||||
"lastModified": "2023-01-10T17:44:07.400",
|
||||
"lastModified": "2023-06-27T17:48:15.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,7 +41,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39082",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-01-04T10:15:10.760",
|
||||
"lastModified": "2023-01-10T17:45:19.300",
|
||||
"lastModified": "2023-06-27T17:52:48.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,7 +41,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39083",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-01-04T10:15:10.847",
|
||||
"lastModified": "2023-01-10T17:46:27.143",
|
||||
"lastModified": "2023-06-27T17:52:54.503",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,7 +41,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39084",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-01-04T10:15:10.910",
|
||||
"lastModified": "2023-01-10T17:47:10.620",
|
||||
"lastModified": "2023-06-27T17:52:57.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,7 +41,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39085",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-01-04T10:15:10.967",
|
||||
"lastModified": "2023-01-10T17:58:01.967",
|
||||
"lastModified": "2023-06-27T17:47:34.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,7 +41,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39086",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-01-04T10:15:11.023",
|
||||
"lastModified": "2023-01-10T17:58:33.343",
|
||||
"lastModified": "2023-06-27T17:47:46.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,7 +41,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39087",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-01-04T10:15:11.080",
|
||||
"lastModified": "2023-01-10T17:58:55.383",
|
||||
"lastModified": "2023-06-27T17:47:53.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,7 +41,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39088",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-01-04T10:15:11.140",
|
||||
"lastModified": "2023-01-10T17:59:17.160",
|
||||
"lastModified": "2023-06-27T17:47:57.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,7 +41,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39301",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-10-19T14:15:09.747",
|
||||
"lastModified": "2022-10-20T19:46:39.757",
|
||||
"lastModified": "2023-06-27T17:20:06.290",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39327",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-10-25T17:15:56.150",
|
||||
"lastModified": "2022-10-28T19:25:49.087",
|
||||
"lastModified": "2023-06-27T17:20:17.873",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39340",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-10-25T17:15:56.213",
|
||||
"lastModified": "2022-10-26T00:51:04.547",
|
||||
"lastModified": "2023-06-27T17:20:41.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39341",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-10-25T17:15:56.273",
|
||||
"lastModified": "2022-10-26T00:51:40.153",
|
||||
"lastModified": "2023-06-27T17:26:27.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39342",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-10-25T17:15:56.333",
|
||||
"lastModified": "2022-10-26T00:52:04.137",
|
||||
"lastModified": "2023-06-27T17:27:07.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39356",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-11-02T17:15:17.520",
|
||||
"lastModified": "2022-11-04T15:00:37.910",
|
||||
"lastModified": "2023-06-27T17:27:11.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,7 +61,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39370",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-11-03T16:15:10.000",
|
||||
"lastModified": "2022-11-03T18:39:47.567",
|
||||
"lastModified": "2023-06-27T17:27:16.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,7 +61,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39392",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-11-10T20:15:11.133",
|
||||
"lastModified": "2022-11-16T02:42:12.203",
|
||||
"lastModified": "2023-06-27T17:27:31.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,10 @@
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39803",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2022-10-11T21:15:15.120",
|
||||
"lastModified": "2022-10-12T19:54:59.487",
|
||||
"lastModified": "2023-06-27T16:37:09.723",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,8 +40,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39804",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2022-10-11T21:15:15.327",
|
||||
"lastModified": "2022-10-12T20:01:13.087",
|
||||
"lastModified": "2023-06-27T17:16:44.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,8 +40,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39805",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2022-10-11T21:15:15.543",
|
||||
"lastModified": "2022-10-12T20:01:31.223",
|
||||
"lastModified": "2023-06-27T17:16:48.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,8 +40,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39806",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2022-10-11T21:15:15.750",
|
||||
"lastModified": "2022-10-12T20:01:45.927",
|
||||
"lastModified": "2023-06-27T17:16:53.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,8 +40,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39808",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2022-10-11T21:15:16.173",
|
||||
"lastModified": "2022-10-12T20:02:16.643",
|
||||
"lastModified": "2023-06-27T17:19:56.367",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,8 +40,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39857",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2022-10-07T15:15:20.717",
|
||||
"lastModified": "2022-10-07T20:53:01.277",
|
||||
"lastModified": "2023-06-27T16:13:16.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39860",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2022-10-07T15:15:21.017",
|
||||
"lastModified": "2022-10-12T01:11:29.860",
|
||||
"lastModified": "2023-06-27T16:13:24.203",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39862",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2022-10-07T15:15:21.290",
|
||||
"lastModified": "2022-10-12T01:44:22.677",
|
||||
"lastModified": "2023-06-27T16:13:42.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39864",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2022-10-07T15:15:21.727",
|
||||
"lastModified": "2022-10-11T22:57:52.267",
|
||||
"lastModified": "2023-06-27T16:13:48.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39865",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2022-10-07T15:15:21.883",
|
||||
"lastModified": "2022-10-11T19:47:52.433",
|
||||
"lastModified": "2023-06-27T16:14:25.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39866",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2022-10-07T15:15:21.983",
|
||||
"lastModified": "2022-10-11T19:40:22.277",
|
||||
"lastModified": "2023-06-27T16:15:55.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39867",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2022-10-07T15:15:22.097",
|
||||
"lastModified": "2022-10-11T19:39:28.773",
|
||||
"lastModified": "2023-06-27T16:16:01.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39868",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2022-10-07T15:15:22.240",
|
||||
"lastModified": "2022-10-11T19:34:01.253",
|
||||
"lastModified": "2023-06-27T16:16:05.830",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39877",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2022-10-07T15:15:23.810",
|
||||
"lastModified": "2022-10-09T02:21:43.740",
|
||||
"lastModified": "2023-06-27T16:25:35.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39879",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2022-11-09T22:15:16.897",
|
||||
"lastModified": "2022-11-10T15:20:12.820",
|
||||
"lastModified": "2023-06-27T16:26:57.103",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,7 +61,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39902",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2022-12-08T16:15:12.340",
|
||||
"lastModified": "2022-12-10T03:08:54.303",
|
||||
"lastModified": "2023-06-27T16:30:04.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,7 +61,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-41170",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2022-10-11T21:15:17.437",
|
||||
"lastModified": "2022-10-12T19:58:00.177",
|
||||
"lastModified": "2023-06-27T16:06:54.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,8 +40,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4115",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.077",
|
||||
"lastModified": "2023-06-27T14:15:10.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0588",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.150",
|
||||
"lastModified": "2023-06-27T14:15:10.150",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0873",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.213",
|
||||
"lastModified": "2023-06-27T14:15:10.213",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1166",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.277",
|
||||
"lastModified": "2023-06-27T14:15:10.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1891",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.340",
|
||||
"lastModified": "2023-06-27T14:15:10.340",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2032",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.417",
|
||||
"lastModified": "2023-06-27T14:15:10.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2068",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.477",
|
||||
"lastModified": "2023-06-27T14:15:10.477",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2178",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.540",
|
||||
"lastModified": "2023-06-27T14:15:10.540",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2326",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.600",
|
||||
"lastModified": "2023-06-27T14:15:10.600",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2482",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.663",
|
||||
"lastModified": "2023-06-27T14:15:10.663",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2580",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.730",
|
||||
"lastModified": "2023-06-27T14:15:10.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2592",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.790",
|
||||
"lastModified": "2023-06-27T14:15:10.790",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2601",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.847",
|
||||
"lastModified": "2023-06-27T14:15:10.847",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2605",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.910",
|
||||
"lastModified": "2023-06-27T14:15:10.910",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2623",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:10.967",
|
||||
"lastModified": "2023-06-27T14:15:10.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2624",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:11.030",
|
||||
"lastModified": "2023-06-27T14:15:11.030",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2627",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:11.090",
|
||||
"lastModified": "2023-06-27T14:15:11.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2628",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:11.153",
|
||||
"lastModified": "2023-06-27T14:15:11.153",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2711",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:11.267",
|
||||
"lastModified": "2023-06-27T14:15:11.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2743",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:11.373",
|
||||
"lastModified": "2023-06-27T14:15:11.373",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2744",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:11.433",
|
||||
"lastModified": "2023-06-27T14:15:11.433",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2795",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:11.493",
|
||||
"lastModified": "2023-06-27T14:15:11.493",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2818",
|
||||
"sourceIdentifier": "security@proofpoint.com",
|
||||
"published": "2023-06-27T15:15:10.350",
|
||||
"lastModified": "2023-06-27T15:15:10.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2842",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:11.567",
|
||||
"lastModified": "2023-06-27T14:15:11.567",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2877",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:11.633",
|
||||
"lastModified": "2023-06-27T14:15:11.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2996",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-27T14:15:11.723",
|
||||
"lastModified": "2023-06-27T14:15:11.723",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:35.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-3132",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-27T03:15:09.913",
|
||||
"lastModified": "2023-06-27T03:15:09.913",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MainWP Child plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.4.1.1 due to insufficient controls on the storage of back-up files. This makes it possible for unauthenticated attackers to extract sensitive data including the entire installations database if a backup occurs and the deletion of the back-up files fail."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El plugin MainWP Child para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n sensible hasta la versi\u00f3n 4.4.1.1 inclusive, debido a controles insuficientes en el almacenamiento de archivos de copia de seguridad. Esto hace posible que atacantes no autenticados extraigan informaci\u00f3n sensible, incluyendo la base de datos completa de las instalaciones, si se produce una copia de seguridad y falla la eliminaci\u00f3n de los archivos de copia de seguridad. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
63
CVE-2023/CVE-2023-323xx/CVE-2023-32339.json
Normal file
63
CVE-2023/CVE-2023-323xx/CVE-2023-32339.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-32339",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-06-27T17:15:09.547",
|
||||
"lastModified": "2023-06-27T17:15:09.547",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Business Automation Workflow is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 255587."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://https://www.ibm.com/support/pages/node/6998727",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://https://www.ibm.com/support/pages/node/7001291",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/6998727",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,15 +2,41 @@
|
||||
"id": "CVE-2023-3291",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-06-16T02:15:08.473",
|
||||
"lastModified": "2023-06-16T03:19:08.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-27T17:53:10.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Desbordamiento de b\u00fafer de pila en el repositorio gpac/gpac de GitHub en versiones anteriores a 2.2.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -36,8 +62,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -46,14 +82,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.2.2",
|
||||
"matchCriteriaId": "DBF31B7B-F4C7-40C0-9245-09FECA1A8164"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/commit/6a748ccc3f76ff10e3ae43014967ea4b0c088aaf",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33213",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-06-19T13:15:09.743",
|
||||
"lastModified": "2023-06-20T07:12:55.493",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-27T16:41:03.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gvectors:wpview:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.3.0",
|
||||
"matchCriteriaId": "8CAA6D48-B83D-4676-9127-D594F4C7C116"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wpview/wordpress-wpview-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,75 @@
|
||||
"id": "CVE-2023-3315",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-06-19T21:15:42.177",
|
||||
"lastModified": "2023-06-20T07:12:55.493",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-27T17:08:44.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing permission checks in Jenkins Team Concert Plugin 2.4.1 and earlier allow attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:team_concert:*:*:*:*:*:jenkins:*:*",
|
||||
"versionEndIncluding": "2.4.1",
|
||||
"matchCriteriaId": "762B4B5C-F87C-4D42-B623-5937FD6E686B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2932",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3318",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-19T13:15:10.173",
|
||||
"lastModified": "2023-06-20T07:12:55.493",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-27T17:24:02.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
@ -71,18 +93,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:resort_management_system_project:resort_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B55CF24-0E9F-4CEA-BAF7-6E26AB8C599E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3318",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.231937",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.231937",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-3371",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-27T02:15:09.657",
|
||||
"lastModified": "2023-06-27T02:15:09.657",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-27T16:15:41.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The User Registration plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'lock_content_form_handler' and 'display_password_form' function in versions up to, and including, 3.7.3. This makes it possible for unauthenticated attackers to decrypt and view the password protected content."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El plugin User Registration para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial debido a la clave de cifrado embebida en las funciones \"lock_content_form_handler\" y \"display_password_form\" en versiones hasta la 3.7.3 inclusive. Esto hace posible que atacantes no autenticados descifren y vean el contenido protegido por contrase\u00f1a. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
67
CVE-2023/CVE-2023-340xx/CVE-2023-34098.json
Normal file
67
CVE-2023/CVE-2023-340xx/CVE-2023-34098.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-34098",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-06-27T17:15:09.683",
|
||||
"lastModified": "2023-06-27T17:15:09.683",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shopware is an open source e-commerce software. Due to an incorrect configuration in the `.htaccess` file, the configuration file of the Javascript could be read in production environments (`themes/package-lock.json`). With this information, the specific Shopware version in a deployment might be determined by an attacker, which could be used for further attacks. Users are advised to update to version 5.7.18. There are no known workarounds for this vulnerability.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/shopware/shopware/security/advisories/GHSA-q97c-2mh3-pgw9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/shopware5/shopware/commit/b3518c8d9562a38615d638f31f79829f6e2f4b6a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.shopware.com/en/changelog-sw5/#5-7-18",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user