From 97bcba6c6afe2ce2d7b44f6b395f85efa8ff10f7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 27 Jun 2023 18:00:36 +0000 Subject: [PATCH] Auto-Update: 2023-06-27T18:00:32.630488+00:00 --- CVE-2020/CVE-2020-211xx/CVE-2020-21174.json | 65 ++++++++++++++- CVE-2020/CVE-2020-212xx/CVE-2020-21246.json | 65 ++++++++++++++- CVE-2020/CVE-2020-212xx/CVE-2020-21252.json | 64 +++++++++++++- CVE-2021/CVE-2021-302xx/CVE-2021-30203.json | 4 +- CVE-2021/CVE-2021-302xx/CVE-2021-30205.json | 4 +- CVE-2022/CVE-2022-08xx/CVE-2022-0823.json | 4 +- CVE-2022/CVE-2022-08xx/CVE-2022-0833.json | 18 +++- CVE-2022/CVE-2022-08xx/CVE-2022-0871.json | 4 +- CVE-2022/CVE-2022-09xx/CVE-2022-0932.json | 4 +- CVE-2022/CVE-2022-09xx/CVE-2022-0952.json | 18 +++- CVE-2022/CVE-2022-09xx/CVE-2022-0959.json | 6 +- CVE-2022/CVE-2022-10xx/CVE-2022-1052.json | 4 +- CVE-2022/CVE-2022-10xx/CVE-2022-1077.json | 4 +- CVE-2022/CVE-2022-10xx/CVE-2022-1092.json | 18 +++- CVE-2022/CVE-2022-12xx/CVE-2022-1203.json | 18 +++- CVE-2022/CVE-2022-12xx/CVE-2022-1238.json | 14 +++- CVE-2022/CVE-2022-12xx/CVE-2022-1256.json | 14 +++- CVE-2022/CVE-2022-15xx/CVE-2022-1511.json | 4 +- CVE-2022/CVE-2022-15xx/CVE-2022-1516.json | 4 +- CVE-2022/CVE-2022-15xx/CVE-2022-1570.json | 18 +++- CVE-2022/CVE-2022-15xx/CVE-2022-1589.json | 18 +++- CVE-2022/CVE-2022-15xx/CVE-2022-1598.json | 14 +++- CVE-2022/CVE-2022-16xx/CVE-2022-1629.json | 15 +++- CVE-2022/CVE-2022-16xx/CVE-2022-1649.json | 4 +- CVE-2022/CVE-2022-16xx/CVE-2022-1661.json | 14 +++- CVE-2022/CVE-2022-17xx/CVE-2022-1714.json | 4 +- CVE-2022/CVE-2022-17xx/CVE-2022-1769.json | 15 +++- CVE-2022/CVE-2022-18xx/CVE-2022-1810.json | 4 +- CVE-2022/CVE-2022-18xx/CVE-2022-1811.json | 4 +- CVE-2022/CVE-2022-206xx/CVE-2022-20683.json | 4 +- CVE-2022/CVE-2022-206xx/CVE-2022-20699.json | 4 +- CVE-2022/CVE-2022-20xx/CVE-2022-2019.json | 4 +- CVE-2022/CVE-2022-20xx/CVE-2022-2062.json | 4 +- CVE-2022/CVE-2022-390xx/CVE-2022-39081.json | 4 +- CVE-2022/CVE-2022-390xx/CVE-2022-39082.json | 4 +- CVE-2022/CVE-2022-390xx/CVE-2022-39083.json | 4 +- CVE-2022/CVE-2022-390xx/CVE-2022-39084.json | 4 +- CVE-2022/CVE-2022-390xx/CVE-2022-39085.json | 4 +- CVE-2022/CVE-2022-390xx/CVE-2022-39086.json | 4 +- CVE-2022/CVE-2022-390xx/CVE-2022-39087.json | 4 +- CVE-2022/CVE-2022-390xx/CVE-2022-39088.json | 4 +- CVE-2022/CVE-2022-393xx/CVE-2022-39301.json | 4 +- CVE-2022/CVE-2022-393xx/CVE-2022-39327.json | 4 +- CVE-2022/CVE-2022-393xx/CVE-2022-39340.json | 4 +- CVE-2022/CVE-2022-393xx/CVE-2022-39341.json | 4 +- CVE-2022/CVE-2022-393xx/CVE-2022-39342.json | 4 +- CVE-2022/CVE-2022-393xx/CVE-2022-39356.json | 4 +- CVE-2022/CVE-2022-393xx/CVE-2022-39370.json | 4 +- CVE-2022/CVE-2022-393xx/CVE-2022-39392.json | 6 +- CVE-2022/CVE-2022-398xx/CVE-2022-39803.json | 18 +++- CVE-2022/CVE-2022-398xx/CVE-2022-39804.json | 18 +++- CVE-2022/CVE-2022-398xx/CVE-2022-39805.json | 18 +++- CVE-2022/CVE-2022-398xx/CVE-2022-39806.json | 18 +++- CVE-2022/CVE-2022-398xx/CVE-2022-39808.json | 18 +++- CVE-2022/CVE-2022-398xx/CVE-2022-39857.json | 4 +- CVE-2022/CVE-2022-398xx/CVE-2022-39860.json | 4 +- CVE-2022/CVE-2022-398xx/CVE-2022-39862.json | 4 +- CVE-2022/CVE-2022-398xx/CVE-2022-39864.json | 4 +- CVE-2022/CVE-2022-398xx/CVE-2022-39865.json | 4 +- CVE-2022/CVE-2022-398xx/CVE-2022-39866.json | 4 +- CVE-2022/CVE-2022-398xx/CVE-2022-39867.json | 4 +- CVE-2022/CVE-2022-398xx/CVE-2022-39868.json | 4 +- CVE-2022/CVE-2022-398xx/CVE-2022-39877.json | 4 +- CVE-2022/CVE-2022-398xx/CVE-2022-39879.json | 4 +- CVE-2022/CVE-2022-399xx/CVE-2022-39902.json | 4 +- CVE-2022/CVE-2022-411xx/CVE-2022-41170.json | 18 +++- CVE-2022/CVE-2022-41xx/CVE-2022-4115.json | 4 +- CVE-2023/CVE-2023-05xx/CVE-2023-0588.json | 4 +- CVE-2023/CVE-2023-08xx/CVE-2023-0873.json | 4 +- CVE-2023/CVE-2023-11xx/CVE-2023-1166.json | 4 +- CVE-2023/CVE-2023-18xx/CVE-2023-1891.json | 4 +- CVE-2023/CVE-2023-20xx/CVE-2023-2032.json | 4 +- CVE-2023/CVE-2023-20xx/CVE-2023-2068.json | 4 +- CVE-2023/CVE-2023-21xx/CVE-2023-2178.json | 4 +- CVE-2023/CVE-2023-23xx/CVE-2023-2326.json | 4 +- CVE-2023/CVE-2023-24xx/CVE-2023-2482.json | 4 +- CVE-2023/CVE-2023-25xx/CVE-2023-2580.json | 4 +- CVE-2023/CVE-2023-25xx/CVE-2023-2592.json | 4 +- CVE-2023/CVE-2023-26xx/CVE-2023-2601.json | 4 +- CVE-2023/CVE-2023-26xx/CVE-2023-2605.json | 4 +- CVE-2023/CVE-2023-26xx/CVE-2023-2623.json | 4 +- CVE-2023/CVE-2023-26xx/CVE-2023-2624.json | 4 +- CVE-2023/CVE-2023-26xx/CVE-2023-2627.json | 4 +- CVE-2023/CVE-2023-26xx/CVE-2023-2628.json | 4 +- CVE-2023/CVE-2023-27xx/CVE-2023-2711.json | 4 +- CVE-2023/CVE-2023-27xx/CVE-2023-2743.json | 4 +- CVE-2023/CVE-2023-27xx/CVE-2023-2744.json | 4 +- CVE-2023/CVE-2023-27xx/CVE-2023-2795.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2818.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2842.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2877.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2996.json | 4 +- CVE-2023/CVE-2023-31xx/CVE-2023-3132.json | 8 +- CVE-2023/CVE-2023-323xx/CVE-2023-32339.json | 63 ++++++++++++++ CVE-2023/CVE-2023-32xx/CVE-2023-3291.json | 72 ++++++++++++++-- CVE-2023/CVE-2023-332xx/CVE-2023-33213.json | 47 ++++++++++- CVE-2023/CVE-2023-33xx/CVE-2023-3315.json | 64 +++++++++++++- CVE-2023/CVE-2023-33xx/CVE-2023-3318.json | 63 ++++++++++++-- CVE-2023/CVE-2023-33xx/CVE-2023-3371.json | 8 +- CVE-2023/CVE-2023-340xx/CVE-2023-34098.json | 67 +++++++++++++++ CVE-2023/CVE-2023-340xx/CVE-2023-34099.json | 67 +++++++++++++++ CVE-2023/CVE-2023-341xx/CVE-2023-34158.json | 68 ++++++++++++++- CVE-2023/CVE-2023-341xx/CVE-2023-34159.json | 63 +++++++++++++- CVE-2023/CVE-2023-341xx/CVE-2023-34160.json | 68 ++++++++++++++- CVE-2023/CVE-2023-341xx/CVE-2023-34161.json | 78 ++++++++++++++++- CVE-2023/CVE-2023-341xx/CVE-2023-34162.json | 63 +++++++++++++- CVE-2023/CVE-2023-341xx/CVE-2023-34163.json | 78 ++++++++++++++++- CVE-2023/CVE-2023-341xx/CVE-2023-34166.json | 78 ++++++++++++++++- CVE-2023/CVE-2023-341xx/CVE-2023-34167.json | 78 ++++++++++++++++- CVE-2023/CVE-2023-342xx/CVE-2023-34240.json | 55 ++++++++++++ CVE-2023/CVE-2023-343xx/CVE-2023-34373.json | 47 ++++++++++- CVE-2023/CVE-2023-343xx/CVE-2023-34395.json | 4 +- CVE-2023/CVE-2023-344xx/CVE-2023-34414.json | 91 ++++++++++++++++++-- CVE-2023/CVE-2023-344xx/CVE-2023-34415.json | 69 ++++++++++++++-- CVE-2023/CVE-2023-344xx/CVE-2023-34416.json | 90 +++++++++++++++++--- CVE-2023/CVE-2023-344xx/CVE-2023-34417.json | 68 +++++++++++++-- CVE-2023/CVE-2023-344xx/CVE-2023-34454.json | 68 +++++++++++++-- CVE-2023/CVE-2023-344xx/CVE-2023-34455.json | 62 ++++++++++++-- CVE-2023/CVE-2023-344xx/CVE-2023-34461.json | 53 +++++++++++- CVE-2023/CVE-2023-348xx/CVE-2023-34830.json | 24 ++++++ CVE-2023/CVE-2023-34xx/CVE-2023-3405.json | 4 +- CVE-2023/CVE-2023-34xx/CVE-2023-3411.json | 4 +- CVE-2023/CVE-2023-34xx/CVE-2023-3412.json | 4 +- CVE-2023/CVE-2023-34xx/CVE-2023-3423.json | 4 +- CVE-2023/CVE-2023-34xx/CVE-2023-3431.json | 4 +- CVE-2023/CVE-2023-34xx/CVE-2023-3432.json | 4 +- CVE-2023/CVE-2023-350xx/CVE-2023-35097.json | 47 ++++++++++- CVE-2023/CVE-2023-350xx/CVE-2023-35098.json | 47 ++++++++++- CVE-2023/CVE-2023-357xx/CVE-2023-35798.json | 4 +- CVE-2023/CVE-2023-357xx/CVE-2023-35799.json | 24 ++++++ CVE-2023/CVE-2023-358xx/CVE-2023-35800.json | 24 ++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35998.json | 4 +- CVE-2023/CVE-2023-360xx/CVE-2023-36000.json | 4 +- CVE-2023/CVE-2023-360xx/CVE-2023-36002.json | 4 +- README.md | 92 +++++++++------------ 135 files changed, 2344 insertions(+), 378 deletions(-) create mode 100644 CVE-2023/CVE-2023-323xx/CVE-2023-32339.json create mode 100644 CVE-2023/CVE-2023-340xx/CVE-2023-34098.json create mode 100644 CVE-2023/CVE-2023-340xx/CVE-2023-34099.json create mode 100644 CVE-2023/CVE-2023-342xx/CVE-2023-34240.json create mode 100644 CVE-2023/CVE-2023-348xx/CVE-2023-34830.json create mode 100644 CVE-2023/CVE-2023-357xx/CVE-2023-35799.json create mode 100644 CVE-2023/CVE-2023-358xx/CVE-2023-35800.json diff --git a/CVE-2020/CVE-2020-211xx/CVE-2020-21174.json b/CVE-2020/CVE-2020-211xx/CVE-2020-21174.json index 4d07b569afd..0c97bdc3c19 100644 --- a/CVE-2020/CVE-2020-211xx/CVE-2020-21174.json +++ b/CVE-2020/CVE-2020-211xx/CVE-2020-21174.json @@ -2,19 +2,76 @@ "id": "CVE-2020-21174", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T15:15:11.030", - "lastModified": "2023-06-20T15:49:08.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:35:02.413", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "File Upload vulenrability in liufee CMS v.2.0.7.1 allows a remote attacker to execute arbitrary code via the image suffix function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:feehi:feehicms:2.0.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8BDECBF4-6272-4580-9B44-B2D6EDFF0DE0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/liufee/cms/issues/44", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-212xx/CVE-2020-21246.json b/CVE-2020/CVE-2020-212xx/CVE-2020-21246.json index 3687cf7d44b..9d742f5b5b7 100644 --- a/CVE-2020/CVE-2020-212xx/CVE-2020-21246.json +++ b/CVE-2020/CVE-2020-212xx/CVE-2020-21246.json @@ -2,19 +2,76 @@ "id": "CVE-2020-21246", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T15:15:11.073", - "lastModified": "2023-06-20T15:49:08.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:33:03.503", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in YiiCMS v.1.0 allows a remote attacker to execute arbitrary code via the news function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yiicms_project:yiicms:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FE5A8EB2-1DFA-4832-A074-31866A7B7CDE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/yongshengli/yiicms/issues/6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-212xx/CVE-2020-21252.json b/CVE-2020/CVE-2020-212xx/CVE-2020-21252.json index a6954bd1099..3420ba6be33 100644 --- a/CVE-2020/CVE-2020-212xx/CVE-2020-21252.json +++ b/CVE-2020/CVE-2020-212xx/CVE-2020-21252.json @@ -2,19 +2,75 @@ "id": "CVE-2020-21252", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T15:15:11.117", - "lastModified": "2023-06-20T15:49:08.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:32:35.853", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross Site Request Forgery vulnerability in Neeke HongCMS 3.0.0 allows a remote attacker to execute arbitrary code and escalate privileges via the updateusers parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hongcms_project:hongcms:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5B8D6DB5-CC3D-4315-92A2-72E06A9AB4F3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Neeke/HongCMS/issues/13", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-302xx/CVE-2021-30203.json b/CVE-2021/CVE-2021-302xx/CVE-2021-30203.json index f9bf598fd98..9cdb0e695de 100644 --- a/CVE-2021/CVE-2021-302xx/CVE-2021-30203.json +++ b/CVE-2021/CVE-2021-302xx/CVE-2021-30203.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30203", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-27T14:15:09.667", - "lastModified": "2023-06-27T14:15:09.667", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-302xx/CVE-2021-30205.json b/CVE-2021/CVE-2021-302xx/CVE-2021-30205.json index 5c038277595..4de3551a20e 100644 --- a/CVE-2021/CVE-2021-302xx/CVE-2021-30205.json +++ b/CVE-2021/CVE-2021-302xx/CVE-2021-30205.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30205", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-27T14:15:09.737", - "lastModified": "2023-06-27T14:15:09.737", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-08xx/CVE-2022-0823.json b/CVE-2022/CVE-2022-08xx/CVE-2022-0823.json index e665d5af08f..e821163ecfa 100644 --- a/CVE-2022/CVE-2022-08xx/CVE-2022-0823.json +++ b/CVE-2022/CVE-2022-08xx/CVE-2022-0823.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0823", "sourceIdentifier": "security@zyxel.com.tw", "published": "2022-06-09T16:15:08.160", - "lastModified": "2022-06-15T16:04:26.180", + "lastModified": "2023-06-27T16:10:09.157", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-203" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-08xx/CVE-2022-0833.json b/CVE-2022/CVE-2022-08xx/CVE-2022-0833.json index 68be2c557e3..c48cec404f4 100644 --- a/CVE-2022/CVE-2022-08xx/CVE-2022-0833.json +++ b/CVE-2022/CVE-2022-08xx/CVE-2022-0833.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0833", "sourceIdentifier": "contact@wpscan.com", "published": "2022-03-28T18:15:09.893", - "lastModified": "2022-04-04T18:08:41.407", + "lastModified": "2023-06-27T16:38:36.147", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,8 +65,22 @@ }, "weaknesses": [ { - "source": "contact@wpscan.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + }, + { + "source": "contact@wpscan.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-08xx/CVE-2022-0871.json b/CVE-2022/CVE-2022-08xx/CVE-2022-0871.json index ab6e62972e2..0b4a7b99fae 100644 --- a/CVE-2022/CVE-2022-08xx/CVE-2022-0871.json +++ b/CVE-2022/CVE-2022-08xx/CVE-2022-0871.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0871", "sourceIdentifier": "security@huntr.dev", "published": "2022-03-11T12:15:07.667", - "lastModified": "2022-03-22T13:44:09.813", + "lastModified": "2023-06-27T16:40:25.093", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "CWE-862" } ] }, diff --git a/CVE-2022/CVE-2022-09xx/CVE-2022-0932.json b/CVE-2022/CVE-2022-09xx/CVE-2022-0932.json index 27ea36734e0..1bc274ceab0 100644 --- a/CVE-2022/CVE-2022-09xx/CVE-2022-0932.json +++ b/CVE-2022/CVE-2022-09xx/CVE-2022-0932.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0932", "sourceIdentifier": "security@huntr.dev", "published": "2022-03-11T15:15:09.857", - "lastModified": "2022-03-18T15:54:05.863", + "lastModified": "2023-06-27T16:40:05.607", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "CWE-862" } ] }, diff --git a/CVE-2022/CVE-2022-09xx/CVE-2022-0952.json b/CVE-2022/CVE-2022-09xx/CVE-2022-0952.json index 6e0450748e9..72ccc6c6438 100644 --- a/CVE-2022/CVE-2022-09xx/CVE-2022-0952.json +++ b/CVE-2022/CVE-2022-09xx/CVE-2022-0952.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0952", "sourceIdentifier": "contact@wpscan.com", "published": "2022-05-02T16:15:08.637", - "lastModified": "2022-05-09T17:23:54.613", + "lastModified": "2023-06-27T16:21:53.877", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,8 +65,22 @@ }, "weaknesses": [ { - "source": "contact@wpscan.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + }, + { + "source": "contact@wpscan.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-09xx/CVE-2022-0959.json b/CVE-2022/CVE-2022-09xx/CVE-2022-0959.json index cffd06db0a9..af6fac5a7d5 100644 --- a/CVE-2022/CVE-2022-09xx/CVE-2022-0959.json +++ b/CVE-2022/CVE-2022-09xx/CVE-2022-0959.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0959", "sourceIdentifier": "secalert@redhat.com", "published": "2022-03-16T15:15:16.213", - "lastModified": "2022-03-28T13:20:38.540", + "lastModified": "2023-06-27T16:39:57.140", "vulnStatus": "Analyzed", "descriptions": [ { @@ -68,6 +68,10 @@ "source": "nvd@nist.gov", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-22" + }, { "lang": "en", "value": "CWE-434" diff --git a/CVE-2022/CVE-2022-10xx/CVE-2022-1052.json b/CVE-2022/CVE-2022-10xx/CVE-2022-1052.json index d2abb03e6c2..a3b7ea139f1 100644 --- a/CVE-2022/CVE-2022-10xx/CVE-2022-1052.json +++ b/CVE-2022/CVE-2022-10xx/CVE-2022-1052.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1052", "sourceIdentifier": "security@huntr.dev", "published": "2022-03-24T13:15:07.837", - "lastModified": "2022-03-31T18:56:17.973", + "lastModified": "2023-06-27T16:39:05.690", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-125" + "value": "CWE-787" } ] }, diff --git a/CVE-2022/CVE-2022-10xx/CVE-2022-1077.json b/CVE-2022/CVE-2022-10xx/CVE-2022-1077.json index 2dcb4b2ccc5..ac6403e2192 100644 --- a/CVE-2022/CVE-2022-10xx/CVE-2022-1077.json +++ b/CVE-2022/CVE-2022-10xx/CVE-2022-1077.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1077", "sourceIdentifier": "cna@vuldb.com", "published": "2022-03-29T06:15:07.507", - "lastModified": "2022-04-04T20:02:18.787", + "lastModified": "2023-06-27T16:38:28.317", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-425" } ] }, diff --git a/CVE-2022/CVE-2022-10xx/CVE-2022-1092.json b/CVE-2022/CVE-2022-10xx/CVE-2022-1092.json index 308ec7d596c..0ace422f311 100644 --- a/CVE-2022/CVE-2022-10xx/CVE-2022-1092.json +++ b/CVE-2022/CVE-2022-10xx/CVE-2022-1092.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1092", "sourceIdentifier": "contact@wpscan.com", "published": "2022-04-25T16:16:08.310", - "lastModified": "2022-05-12T14:14:31.857", + "lastModified": "2023-06-27T16:22:04.763", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,8 +65,22 @@ }, "weaknesses": [ { - "source": "contact@wpscan.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + }, + { + "source": "contact@wpscan.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-12xx/CVE-2022-1203.json b/CVE-2022/CVE-2022-12xx/CVE-2022-1203.json index ec9583b0819..c5989b2ede4 100644 --- a/CVE-2022/CVE-2022-12xx/CVE-2022-1203.json +++ b/CVE-2022/CVE-2022-12xx/CVE-2022-1203.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1203", "sourceIdentifier": "contact@wpscan.com", "published": "2022-05-30T09:15:09.050", - "lastModified": "2022-11-16T17:23:21.230", + "lastModified": "2023-06-27T16:13:49.553", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,8 +65,22 @@ }, "weaknesses": [ { - "source": "contact@wpscan.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + }, + { + "source": "contact@wpscan.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-12xx/CVE-2022-1238.json b/CVE-2022/CVE-2022-12xx/CVE-2022-1238.json index c3112f7e98e..3233678cf6a 100644 --- a/CVE-2022/CVE-2022-12xx/CVE-2022-1238.json +++ b/CVE-2022/CVE-2022-12xx/CVE-2022-1238.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1238", "sourceIdentifier": "security@huntr.dev", "published": "2022-04-06T10:15:08.200", - "lastModified": "2022-04-14T14:45:15.603", + "lastModified": "2023-06-27T16:38:13.430", "vulnStatus": "Analyzed", "descriptions": [ { @@ -87,8 +87,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-12xx/CVE-2022-1256.json b/CVE-2022/CVE-2022-12xx/CVE-2022-1256.json index 374ccf10584..0c5040e0e03 100644 --- a/CVE-2022/CVE-2022-12xx/CVE-2022-1256.json +++ b/CVE-2022/CVE-2022-12xx/CVE-2022-1256.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1256", "sourceIdentifier": "psirt@mcafee.com", "published": "2022-04-14T15:15:07.943", - "lastModified": "2022-04-23T02:22:18.863", + "lastModified": "2023-06-27T16:22:23.443", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,8 +85,18 @@ }, "weaknesses": [ { - "source": "psirt@mcafee.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, + { + "source": "psirt@mcafee.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1511.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1511.json index 0c865cedfa5..9c5c532388e 100644 --- a/CVE-2022/CVE-2022-15xx/CVE-2022-1511.json +++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1511.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1511", "sourceIdentifier": "security@huntr.dev", "published": "2022-04-28T15:15:09.637", - "lastModified": "2022-05-06T18:56:42.457", + "lastModified": "2023-06-27T16:22:00.897", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "CWE-862" } ] }, diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1516.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1516.json index 776fa68acf9..68a93b44b5e 100644 --- a/CVE-2022/CVE-2022-15xx/CVE-2022-1516.json +++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1516.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1516", "sourceIdentifier": "secalert@redhat.com", "published": "2022-05-05T15:15:07.953", - "lastModified": "2022-12-08T20:02:48.387", + "lastModified": "2023-06-27T16:21:46.207", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-416" + "value": "CWE-476" } ] }, diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1570.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1570.json index 7f2aa3e8e7d..73548fe4e58 100644 --- a/CVE-2022/CVE-2022-15xx/CVE-2022-1570.json +++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1570.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1570", "sourceIdentifier": "contact@wpscan.com", "published": "2022-06-08T10:15:09.790", - "lastModified": "2022-06-15T14:39:34.643", + "lastModified": "2023-06-27T16:13:22.243", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,8 +65,22 @@ }, "weaknesses": [ { - "source": "contact@wpscan.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + }, + { + "source": "contact@wpscan.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1589.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1589.json index f0a658e58b8..101614e4dec 100644 --- a/CVE-2022/CVE-2022-15xx/CVE-2022-1589.json +++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1589.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1589", "sourceIdentifier": "contact@wpscan.com", "published": "2022-05-30T09:15:10.157", - "lastModified": "2022-06-08T15:22:13.977", + "lastModified": "2023-06-27T16:13:43.517", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,8 +65,22 @@ }, "weaknesses": [ { - "source": "contact@wpscan.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-863" + } + ] + }, + { + "source": "contact@wpscan.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1598.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1598.json index d5a28d86307..bc5732a53ae 100644 --- a/CVE-2022/CVE-2022-15xx/CVE-2022-1598.json +++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1598.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1598", "sourceIdentifier": "contact@wpscan.com", "published": "2022-06-08T10:15:09.953", - "lastModified": "2022-06-15T15:15:27.637", + "lastModified": "2023-06-27T16:13:17.203", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,8 +65,18 @@ }, "weaknesses": [ { - "source": "contact@wpscan.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + }, + { + "source": "contact@wpscan.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-16xx/CVE-2022-1629.json b/CVE-2022/CVE-2022-16xx/CVE-2022-1629.json index 4e2c15c58d2..c74ffe9633d 100644 --- a/CVE-2022/CVE-2022-16xx/CVE-2022-1629.json +++ b/CVE-2022/CVE-2022-16xx/CVE-2022-1629.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1629", "sourceIdentifier": "security@huntr.dev", "published": "2022-05-10T14:15:08.530", - "lastModified": "2023-05-03T12:15:22.957", - "vulnStatus": "Modified", + "lastModified": "2023-06-27T16:21:30.427", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -164,7 +164,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2022/Oct/28", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2022/Oct/41", @@ -207,7 +211,10 @@ }, { "url": "https://security.gentoo.org/glsa/202305-16", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT213488", diff --git a/CVE-2022/CVE-2022-16xx/CVE-2022-1649.json b/CVE-2022/CVE-2022-16xx/CVE-2022-1649.json index 9a744814413..51f58128e0f 100644 --- a/CVE-2022/CVE-2022-16xx/CVE-2022-1649.json +++ b/CVE-2022/CVE-2022-16xx/CVE-2022-1649.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1649", "sourceIdentifier": "security@huntr.dev", "published": "2022-05-10T17:15:07.993", - "lastModified": "2022-05-16T16:27:22.627", + "lastModified": "2023-06-27T16:20:42.480", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-787" + "value": "CWE-476" } ] }, diff --git a/CVE-2022/CVE-2022-16xx/CVE-2022-1661.json b/CVE-2022/CVE-2022-16xx/CVE-2022-1661.json index a4be41c43f6..1bd2848717d 100644 --- a/CVE-2022/CVE-2022-16xx/CVE-2022-1661.json +++ b/CVE-2022/CVE-2022-16xx/CVE-2022-1661.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1661", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-06-02T14:15:33.070", - "lastModified": "2022-06-09T19:36:15.897", + "lastModified": "2023-06-27T16:13:26.807", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,8 +85,18 @@ }, "weaknesses": [ { - "source": "ics-cert@hq.dhs.gov", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-17xx/CVE-2022-1714.json b/CVE-2022/CVE-2022-17xx/CVE-2022-1714.json index 51fabefc5b2..1df1dfdd565 100644 --- a/CVE-2022/CVE-2022-17xx/CVE-2022-1714.json +++ b/CVE-2022/CVE-2022-17xx/CVE-2022-1714.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1714", "sourceIdentifier": "security@huntr.dev", "published": "2022-05-13T15:15:08.733", - "lastModified": "2022-05-23T18:35:39.780", + "lastModified": "2023-06-27T16:18:34.593", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-787" + "value": "CWE-125" } ] }, diff --git a/CVE-2022/CVE-2022-17xx/CVE-2022-1769.json b/CVE-2022/CVE-2022-17xx/CVE-2022-1769.json index f3b61eaa90f..cff877f67be 100644 --- a/CVE-2022/CVE-2022-17xx/CVE-2022-1769.json +++ b/CVE-2022/CVE-2022-17xx/CVE-2022-1769.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1769", "sourceIdentifier": "security@huntr.dev", "published": "2022-05-17T17:15:08.153", - "lastModified": "2023-05-03T12:15:28.663", - "vulnStatus": "Modified", + "lastModified": "2023-06-27T16:18:28.207", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -169,7 +169,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2022/Oct/28", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2022/Oct/41", @@ -227,7 +231,10 @@ }, { "url": "https://security.gentoo.org/glsa/202305-16", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT213488", diff --git a/CVE-2022/CVE-2022-18xx/CVE-2022-1810.json b/CVE-2022/CVE-2022-18xx/CVE-2022-1810.json index b1822799891..c210b15d452 100644 --- a/CVE-2022/CVE-2022-18xx/CVE-2022-1810.json +++ b/CVE-2022/CVE-2022-18xx/CVE-2022-1810.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1810", "sourceIdentifier": "security@huntr.dev", "published": "2022-05-23T12:16:16.490", - "lastModified": "2022-05-30T00:33:26.277", + "lastModified": "2023-06-27T16:17:50.367", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-732" + "value": "CWE-639" } ] }, diff --git a/CVE-2022/CVE-2022-18xx/CVE-2022-1811.json b/CVE-2022/CVE-2022-18xx/CVE-2022-1811.json index 1aa86a2953a..b7a36453b5e 100644 --- a/CVE-2022/CVE-2022-18xx/CVE-2022-1811.json +++ b/CVE-2022/CVE-2022-18xx/CVE-2022-1811.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1811", "sourceIdentifier": "security@huntr.dev", "published": "2022-05-23T16:16:06.963", - "lastModified": "2022-06-02T22:57:49.140", + "lastModified": "2023-06-27T16:14:48.967", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-79" + "value": "CWE-434" } ] }, diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20683.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20683.json index 965883ff13e..5a387afc6a6 100644 --- a/CVE-2022/CVE-2022-206xx/CVE-2022-20683.json +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20683.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20683", "sourceIdentifier": "ykramarz@cisco.com", "published": "2022-04-15T15:15:12.667", - "lastModified": "2022-04-26T18:25:27.013", + "lastModified": "2023-06-27T16:22:11.083", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] }, diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20699.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20699.json index 794e1fc2b23..2a3833a1e7b 100644 --- a/CVE-2022/CVE-2022-206xx/CVE-2022-20699.json +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20699.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20699", "sourceIdentifier": "ykramarz@cisco.com", "published": "2022-02-10T18:15:08.980", - "lastModified": "2022-05-12T19:36:43.907", + "lastModified": "2023-06-27T16:37:59.953", "vulnStatus": "Analyzed", "cisaExploitAdd": "2022-03-03", "cisaActionDue": "2022-03-17", @@ -96,7 +96,7 @@ "description": [ { "lang": "en", - "value": "CWE-787" + "value": "CWE-1284" } ] }, diff --git a/CVE-2022/CVE-2022-20xx/CVE-2022-2019.json b/CVE-2022/CVE-2022-20xx/CVE-2022-2019.json index 37cd8f75a43..d17a628bc3e 100644 --- a/CVE-2022/CVE-2022-20xx/CVE-2022-2019.json +++ b/CVE-2022/CVE-2022-20xx/CVE-2022-2019.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2019", "sourceIdentifier": "cna@vuldb.com", "published": "2022-06-09T16:15:08.753", - "lastModified": "2022-06-15T17:37:09.397", + "lastModified": "2023-06-27T16:09:57.397", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-20xx/CVE-2022-2062.json b/CVE-2022/CVE-2022-20xx/CVE-2022-2062.json index 273ff15d554..0079f597815 100644 --- a/CVE-2022/CVE-2022-20xx/CVE-2022-2062.json +++ b/CVE-2022/CVE-2022-20xx/CVE-2022-2062.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2062", "sourceIdentifier": "security@huntr.dev", "published": "2022-06-13T12:15:08.107", - "lastModified": "2022-06-17T19:30:02.763", + "lastModified": "2023-06-27T16:09:47.227", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-918" + "value": "CWE-209" } ] }, diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39081.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39081.json index 65d91488350..106cb36de27 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39081.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39081.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39081", "sourceIdentifier": "security@unisoc.com", "published": "2023-01-04T10:15:10.707", - "lastModified": "2023-01-10T17:44:07.400", + "lastModified": "2023-06-27T17:48:15.163", "vulnStatus": "Analyzed", "descriptions": [ { @@ -41,7 +41,7 @@ "description": [ { "lang": "en", - "value": "CWE-276" + "value": "CWE-862" } ] }, diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39082.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39082.json index b960385fcb4..8d7b8029347 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39082.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39082.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39082", "sourceIdentifier": "security@unisoc.com", "published": "2023-01-04T10:15:10.760", - "lastModified": "2023-01-10T17:45:19.300", + "lastModified": "2023-06-27T17:52:48.607", "vulnStatus": "Analyzed", "descriptions": [ { @@ -41,7 +41,7 @@ "description": [ { "lang": "en", - "value": "CWE-276" + "value": "CWE-862" } ] }, diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39083.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39083.json index 31af10f4460..f6cf47877bd 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39083.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39083.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39083", "sourceIdentifier": "security@unisoc.com", "published": "2023-01-04T10:15:10.847", - "lastModified": "2023-01-10T17:46:27.143", + "lastModified": "2023-06-27T17:52:54.503", "vulnStatus": "Analyzed", "descriptions": [ { @@ -41,7 +41,7 @@ "description": [ { "lang": "en", - "value": "CWE-276" + "value": "CWE-862" } ] }, diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39084.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39084.json index df1c677d9f8..ff08ab17a17 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39084.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39084.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39084", "sourceIdentifier": "security@unisoc.com", "published": "2023-01-04T10:15:10.910", - "lastModified": "2023-01-10T17:47:10.620", + "lastModified": "2023-06-27T17:52:57.840", "vulnStatus": "Analyzed", "descriptions": [ { @@ -41,7 +41,7 @@ "description": [ { "lang": "en", - "value": "CWE-276" + "value": "CWE-862" } ] }, diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39085.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39085.json index dccda7184cc..700d4c33131 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39085.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39085.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39085", "sourceIdentifier": "security@unisoc.com", "published": "2023-01-04T10:15:10.967", - "lastModified": "2023-01-10T17:58:01.967", + "lastModified": "2023-06-27T17:47:34.140", "vulnStatus": "Analyzed", "descriptions": [ { @@ -41,7 +41,7 @@ "description": [ { "lang": "en", - "value": "CWE-276" + "value": "CWE-862" } ] }, diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39086.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39086.json index b99eeb4d080..5cfdd81c999 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39086.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39086.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39086", "sourceIdentifier": "security@unisoc.com", "published": "2023-01-04T10:15:11.023", - "lastModified": "2023-01-10T17:58:33.343", + "lastModified": "2023-06-27T17:47:46.057", "vulnStatus": "Analyzed", "descriptions": [ { @@ -41,7 +41,7 @@ "description": [ { "lang": "en", - "value": "CWE-276" + "value": "CWE-862" } ] }, diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39087.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39087.json index 3eb0ea156d7..4cf91e94dbb 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39087.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39087.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39087", "sourceIdentifier": "security@unisoc.com", "published": "2023-01-04T10:15:11.080", - "lastModified": "2023-01-10T17:58:55.383", + "lastModified": "2023-06-27T17:47:53.420", "vulnStatus": "Analyzed", "descriptions": [ { @@ -41,7 +41,7 @@ "description": [ { "lang": "en", - "value": "CWE-276" + "value": "CWE-862" } ] }, diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39088.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39088.json index bf8d83b769e..7a82f988b1c 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39088.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39088.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39088", "sourceIdentifier": "security@unisoc.com", "published": "2023-01-04T10:15:11.140", - "lastModified": "2023-01-10T17:59:17.160", + "lastModified": "2023-06-27T17:47:57.033", "vulnStatus": "Analyzed", "descriptions": [ { @@ -41,7 +41,7 @@ "description": [ { "lang": "en", - "value": "CWE-276" + "value": "CWE-862" } ] }, diff --git a/CVE-2022/CVE-2022-393xx/CVE-2022-39301.json b/CVE-2022/CVE-2022-393xx/CVE-2022-39301.json index 222b2d2671b..ed171e06e76 100644 --- a/CVE-2022/CVE-2022-393xx/CVE-2022-39301.json +++ b/CVE-2022/CVE-2022-393xx/CVE-2022-39301.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39301", "sourceIdentifier": "security-advisories@github.com", "published": "2022-10-19T14:15:09.747", - "lastModified": "2022-10-20T19:46:39.757", + "lastModified": "2023-06-27T17:20:06.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-79" + "value": "CWE-434" } ] }, diff --git a/CVE-2022/CVE-2022-393xx/CVE-2022-39327.json b/CVE-2022/CVE-2022-393xx/CVE-2022-39327.json index 3f3791f5daf..27ea9a6ef2f 100644 --- a/CVE-2022/CVE-2022-393xx/CVE-2022-39327.json +++ b/CVE-2022/CVE-2022-393xx/CVE-2022-39327.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39327", "sourceIdentifier": "security-advisories@github.com", "published": "2022-10-25T17:15:56.150", - "lastModified": "2022-10-28T19:25:49.087", + "lastModified": "2023-06-27T17:20:17.873", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-78" } ] }, diff --git a/CVE-2022/CVE-2022-393xx/CVE-2022-39340.json b/CVE-2022/CVE-2022-393xx/CVE-2022-39340.json index d1b1b334efd..ac5b25f7a02 100644 --- a/CVE-2022/CVE-2022-393xx/CVE-2022-39340.json +++ b/CVE-2022/CVE-2022-393xx/CVE-2022-39340.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39340", "sourceIdentifier": "security-advisories@github.com", "published": "2022-10-25T17:15:56.213", - "lastModified": "2022-10-26T00:51:04.547", + "lastModified": "2023-06-27T17:20:41.077", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "CWE-862" } ] }, diff --git a/CVE-2022/CVE-2022-393xx/CVE-2022-39341.json b/CVE-2022/CVE-2022-393xx/CVE-2022-39341.json index 23d59c0a28d..eb0e2fceb17 100644 --- a/CVE-2022/CVE-2022-393xx/CVE-2022-39341.json +++ b/CVE-2022/CVE-2022-393xx/CVE-2022-39341.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39341", "sourceIdentifier": "security-advisories@github.com", "published": "2022-10-25T17:15:56.273", - "lastModified": "2022-10-26T00:51:40.153", + "lastModified": "2023-06-27T17:26:27.037", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-393xx/CVE-2022-39342.json b/CVE-2022/CVE-2022-393xx/CVE-2022-39342.json index f09d9410733..b28fca54830 100644 --- a/CVE-2022/CVE-2022-393xx/CVE-2022-39342.json +++ b/CVE-2022/CVE-2022-393xx/CVE-2022-39342.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39342", "sourceIdentifier": "security-advisories@github.com", "published": "2022-10-25T17:15:56.333", - "lastModified": "2022-10-26T00:52:04.137", + "lastModified": "2023-06-27T17:27:07.260", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-393xx/CVE-2022-39356.json b/CVE-2022/CVE-2022-393xx/CVE-2022-39356.json index a61a69ab245..20ee7192126 100644 --- a/CVE-2022/CVE-2022-393xx/CVE-2022-39356.json +++ b/CVE-2022/CVE-2022-393xx/CVE-2022-39356.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39356", "sourceIdentifier": "security-advisories@github.com", "published": "2022-11-02T17:15:17.520", - "lastModified": "2022-11-04T15:00:37.910", + "lastModified": "2023-06-27T17:27:11.653", "vulnStatus": "Analyzed", "descriptions": [ { @@ -61,7 +61,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-393xx/CVE-2022-39370.json b/CVE-2022/CVE-2022-393xx/CVE-2022-39370.json index 6f4af470551..047c40d8887 100644 --- a/CVE-2022/CVE-2022-393xx/CVE-2022-39370.json +++ b/CVE-2022/CVE-2022-393xx/CVE-2022-39370.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39370", "sourceIdentifier": "security-advisories@github.com", "published": "2022-11-03T16:15:10.000", - "lastModified": "2022-11-03T18:39:47.567", + "lastModified": "2023-06-27T17:27:16.027", "vulnStatus": "Analyzed", "descriptions": [ { @@ -61,7 +61,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-393xx/CVE-2022-39392.json b/CVE-2022/CVE-2022-393xx/CVE-2022-39392.json index e13de27a856..52fbe75b5a4 100644 --- a/CVE-2022/CVE-2022-393xx/CVE-2022-39392.json +++ b/CVE-2022/CVE-2022-393xx/CVE-2022-39392.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39392", "sourceIdentifier": "security-advisories@github.com", "published": "2022-11-10T20:15:11.133", - "lastModified": "2022-11-16T02:42:12.203", + "lastModified": "2023-06-27T17:27:31.237", "vulnStatus": "Analyzed", "descriptions": [ { @@ -59,6 +59,10 @@ "source": "nvd@nist.gov", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-125" + }, { "lang": "en", "value": "CWE-787" diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39803.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39803.json index 961ac8585e3..43a898d9606 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39803.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39803.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39803", "sourceIdentifier": "cna@sap.com", "published": "2022-10-11T21:15:15.120", - "lastModified": "2022-10-12T19:54:59.487", + "lastModified": "2023-06-27T16:37:09.723", "vulnStatus": "Analyzed", "descriptions": [ { @@ -40,8 +40,22 @@ }, "weaknesses": [ { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@sap.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39804.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39804.json index 53b297cab7c..aa93178220e 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39804.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39804.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39804", "sourceIdentifier": "cna@sap.com", "published": "2022-10-11T21:15:15.327", - "lastModified": "2022-10-12T20:01:13.087", + "lastModified": "2023-06-27T17:16:44.390", "vulnStatus": "Analyzed", "descriptions": [ { @@ -40,8 +40,22 @@ }, "weaknesses": [ { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@sap.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39805.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39805.json index 3531de00948..4bd0b79ae92 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39805.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39805.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39805", "sourceIdentifier": "cna@sap.com", "published": "2022-10-11T21:15:15.543", - "lastModified": "2022-10-12T20:01:31.223", + "lastModified": "2023-06-27T17:16:48.887", "vulnStatus": "Analyzed", "descriptions": [ { @@ -40,8 +40,22 @@ }, "weaknesses": [ { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@sap.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39806.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39806.json index 6d3c6ab6a8a..a4f08614960 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39806.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39806.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39806", "sourceIdentifier": "cna@sap.com", "published": "2022-10-11T21:15:15.750", - "lastModified": "2022-10-12T20:01:45.927", + "lastModified": "2023-06-27T17:16:53.210", "vulnStatus": "Analyzed", "descriptions": [ { @@ -40,8 +40,22 @@ }, "weaknesses": [ { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@sap.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39808.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39808.json index a5a9e335eee..b1374317d8f 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39808.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39808.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39808", "sourceIdentifier": "cna@sap.com", "published": "2022-10-11T21:15:16.173", - "lastModified": "2022-10-12T20:02:16.643", + "lastModified": "2023-06-27T17:19:56.367", "vulnStatus": "Analyzed", "descriptions": [ { @@ -40,8 +40,22 @@ }, "weaknesses": [ { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@sap.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39857.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39857.json index b4856e83165..a5c13f6e1fe 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39857.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39857.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39857", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-10-07T15:15:20.717", - "lastModified": "2022-10-07T20:53:01.277", + "lastModified": "2023-06-27T16:13:16.047", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39860.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39860.json index 9c76e6f76f8..7d0c6f13a33 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39860.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39860.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39860", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-10-07T15:15:21.017", - "lastModified": "2022-10-12T01:11:29.860", + "lastModified": "2023-06-27T16:13:24.203", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39862.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39862.json index ba899d45a19..a28dcb1fa4c 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39862.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39862.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39862", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-10-07T15:15:21.290", - "lastModified": "2022-10-12T01:44:22.677", + "lastModified": "2023-06-27T16:13:42.383", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39864.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39864.json index d6e96818625..3355b12e712 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39864.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39864.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39864", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-10-07T15:15:21.727", - "lastModified": "2022-10-11T22:57:52.267", + "lastModified": "2023-06-27T16:13:48.267", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39865.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39865.json index c2405d2d9f9..d1552cbff3e 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39865.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39865.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39865", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-10-07T15:15:21.883", - "lastModified": "2022-10-11T19:47:52.433", + "lastModified": "2023-06-27T16:14:25.387", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39866.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39866.json index 48e6d239e53..c95ea2ec4c6 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39866.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39866.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39866", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-10-07T15:15:21.983", - "lastModified": "2022-10-11T19:40:22.277", + "lastModified": "2023-06-27T16:15:55.140", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39867.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39867.json index e7f32550354..24ec45d6d78 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39867.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39867.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39867", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-10-07T15:15:22.097", - "lastModified": "2022-10-11T19:39:28.773", + "lastModified": "2023-06-27T16:16:01.497", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39868.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39868.json index 6733148d1a6..b4b42cbfb21 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39868.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39868.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39868", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-10-07T15:15:22.240", - "lastModified": "2022-10-11T19:34:01.253", + "lastModified": "2023-06-27T16:16:05.830", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39877.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39877.json index 7738be64dd3..63d22e9ae6e 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39877.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39877.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39877", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-10-07T15:15:23.810", - "lastModified": "2022-10-09T02:21:43.740", + "lastModified": "2023-06-27T16:25:35.270", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-398xx/CVE-2022-39879.json b/CVE-2022/CVE-2022-398xx/CVE-2022-39879.json index 7a258d3e313..5457d7991c7 100644 --- a/CVE-2022/CVE-2022-398xx/CVE-2022-39879.json +++ b/CVE-2022/CVE-2022-398xx/CVE-2022-39879.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39879", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-11-09T22:15:16.897", - "lastModified": "2022-11-10T15:20:12.820", + "lastModified": "2023-06-27T16:26:57.103", "vulnStatus": "Analyzed", "descriptions": [ { @@ -61,7 +61,7 @@ "description": [ { "lang": "en", - "value": "CWE-862" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-399xx/CVE-2022-39902.json b/CVE-2022/CVE-2022-399xx/CVE-2022-39902.json index 828c632ced1..a753773723e 100644 --- a/CVE-2022/CVE-2022-399xx/CVE-2022-39902.json +++ b/CVE-2022/CVE-2022-399xx/CVE-2022-39902.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39902", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-12-08T16:15:12.340", - "lastModified": "2022-12-10T03:08:54.303", + "lastModified": "2023-06-27T16:30:04.827", "vulnStatus": "Analyzed", "descriptions": [ { @@ -61,7 +61,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-411xx/CVE-2022-41170.json b/CVE-2022/CVE-2022-411xx/CVE-2022-41170.json index 80b7e281dd7..c0d2df1d440 100644 --- a/CVE-2022/CVE-2022-411xx/CVE-2022-41170.json +++ b/CVE-2022/CVE-2022-411xx/CVE-2022-41170.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41170", "sourceIdentifier": "cna@sap.com", "published": "2022-10-11T21:15:17.437", - "lastModified": "2022-10-12T19:58:00.177", + "lastModified": "2023-06-27T16:06:54.550", "vulnStatus": "Analyzed", "descriptions": [ { @@ -40,8 +40,22 @@ }, "weaknesses": [ { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@sap.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4115.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4115.json index 0a9d4f36eeb..b4ec5459fb8 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4115.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4115.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4115", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.077", - "lastModified": "2023-06-27T14:15:10.077", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0588.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0588.json index e5a08da4bcb..735fc0bf79e 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0588.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0588.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0588", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.150", - "lastModified": "2023-06-27T14:15:10.150", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0873.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0873.json index e4319900447..a931cef9f8f 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0873.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0873.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0873", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.213", - "lastModified": "2023-06-27T14:15:10.213", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1166.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1166.json index 81b2b219813..b7927b3eea5 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1166.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1166.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1166", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.277", - "lastModified": "2023-06-27T14:15:10.277", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1891.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1891.json index ae643de259b..cd494324b59 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1891.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1891.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1891", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.340", - "lastModified": "2023-06-27T14:15:10.340", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2032.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2032.json index e0c7eb0b8e7..f492eb4c1dd 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2032.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2032.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2032", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.417", - "lastModified": "2023-06-27T14:15:10.417", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2068.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2068.json index 82bc3ef20be..11ad65004a7 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2068.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2068.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2068", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.477", - "lastModified": "2023-06-27T14:15:10.477", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2178.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2178.json index edaf151dda3..c3767ae688b 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2178.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2178.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2178", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.540", - "lastModified": "2023-06-27T14:15:10.540", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2326.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2326.json index d37b732c01c..0397e44d70e 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2326.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2326.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2326", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.600", - "lastModified": "2023-06-27T14:15:10.600", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2482.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2482.json index 8ae5c2013db..6e61f04fcbe 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2482.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2482.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2482", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.663", - "lastModified": "2023-06-27T14:15:10.663", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2580.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2580.json index 820b1ea8893..75cb36ffae3 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2580.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2580.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2580", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.730", - "lastModified": "2023-06-27T14:15:10.730", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2592.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2592.json index dcf21273af4..e5e26dd088f 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2592.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2592.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2592", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.790", - "lastModified": "2023-06-27T14:15:10.790", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2601.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2601.json index 89fcc17f988..5006159b854 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2601.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2601.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2601", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.847", - "lastModified": "2023-06-27T14:15:10.847", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2605.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2605.json index b72997dd662..9a13e5c5b54 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2605.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2605.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2605", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.910", - "lastModified": "2023-06-27T14:15:10.910", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2623.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2623.json index d3999516a3c..1f961d9774c 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2623.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2623.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2623", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.967", - "lastModified": "2023-06-27T14:15:10.967", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2624.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2624.json index 4a94afff584..f494fa94eee 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2624.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2624.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2624", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.030", - "lastModified": "2023-06-27T14:15:11.030", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2627.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2627.json index f359bb7deef..0681d8519c4 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2627.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2627.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2627", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.090", - "lastModified": "2023-06-27T14:15:11.090", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2628.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2628.json index d0ca9b805a2..6b9480a3f2e 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2628.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2628.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2628", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.153", - "lastModified": "2023-06-27T14:15:11.153", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2711.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2711.json index 912f0ef3f46..1a9c5319eb6 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2711.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2711.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2711", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.267", - "lastModified": "2023-06-27T14:15:11.267", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2743.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2743.json index f337e995037..8e0190dfa4f 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2743.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2743.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2743", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.373", - "lastModified": "2023-06-27T14:15:11.373", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2744.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2744.json index e837472d516..524970e4046 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2744.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2744.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2744", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.433", - "lastModified": "2023-06-27T14:15:11.433", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2795.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2795.json index 01ec1ecefc0..9b82ee9f666 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2795.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2795.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2795", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.493", - "lastModified": "2023-06-27T14:15:11.493", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2818.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2818.json index a590877f1e2..7f65e3475ce 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2818.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2818.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2818", "sourceIdentifier": "security@proofpoint.com", "published": "2023-06-27T15:15:10.350", - "lastModified": "2023-06-27T15:15:10.350", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2842.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2842.json index f8e55e4f9f3..33bc7274c9a 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2842.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2842.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2842", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.567", - "lastModified": "2023-06-27T14:15:11.567", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2877.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2877.json index dd75df5a645..625fd4dcc38 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2877.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2877.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2877", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.633", - "lastModified": "2023-06-27T14:15:11.633", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2996.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2996.json index 6473721166c..39f8705ea3a 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2996.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2996.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2996", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:11.723", - "lastModified": "2023-06-27T14:15:11.723", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3132.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3132.json index 1875875f350..86effb2d11c 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3132.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3132.json @@ -2,12 +2,16 @@ "id": "CVE-2023-3132", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-27T03:15:09.913", - "lastModified": "2023-06-27T03:15:09.913", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The MainWP Child plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.4.1.1 due to insufficient controls on the storage of back-up files. This makes it possible for unauthenticated attackers to extract sensitive data including the entire installations database if a backup occurs and the deletion of the back-up files fail." + }, + { + "lang": "es", + "value": "El plugin MainWP Child para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n sensible hasta la versi\u00f3n 4.4.1.1 inclusive, debido a controles insuficientes en el almacenamiento de archivos de copia de seguridad. Esto hace posible que atacantes no autenticados extraigan informaci\u00f3n sensible, incluyendo la base de datos completa de las instalaciones, si se produce una copia de seguridad y falla la eliminaci\u00f3n de los archivos de copia de seguridad. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32339.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32339.json new file mode 100644 index 00000000000..fb3f474a52f --- /dev/null +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32339.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-32339", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-06-27T17:15:09.547", + "lastModified": "2023-06-27T17:15:09.547", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Business Automation Workflow is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 255587." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://https://www.ibm.com/support/pages/node/6998727", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://https://www.ibm.com/support/pages/node/7001291", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/6998727", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3291.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3291.json index 20ca2ae76da..ec9ddc1361a 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3291.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3291.json @@ -2,15 +2,41 @@ "id": "CVE-2023-3291", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-16T02:15:08.473", - "lastModified": "2023-06-16T03:19:08.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:53:10.120", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2." + }, + { + "lang": "es", + "value": "Desbordamiento de b\u00fafer de pila en el repositorio gpac/gpac de GitHub en versiones anteriores a 2.2.2." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -36,8 +62,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,14 +82,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2.2", + "matchCriteriaId": "DBF31B7B-F4C7-40C0-9245-09FECA1A8164" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gpac/gpac/commit/6a748ccc3f76ff10e3ae43014967ea4b0c088aaf", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33213.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33213.json index 589c4606fee..d142e577025 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33213.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33213.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33213", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-19T13:15:09.743", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T16:41:03.113", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gvectors:wpview:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.0", + "matchCriteriaId": "8CAA6D48-B83D-4676-9127-D594F4C7C116" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wpview/wordpress-wpview-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3315.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3315.json index f277ed813cd..917902620a3 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3315.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3315.json @@ -2,19 +2,75 @@ "id": "CVE-2023-3315", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-06-19T21:15:42.177", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:08:44.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Missing permission checks in Jenkins Team Concert Plugin 2.4.1 and earlier allow attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jenkins:team_concert:*:*:*:*:*:jenkins:*:*", + "versionEndIncluding": "2.4.1", + "matchCriteriaId": "762B4B5C-F87C-4D42-B623-5937FD6E686B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2932", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3318.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3318.json index 06ed19b235e..3145ace6f24 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3318.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3318.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3318", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-19T13:15:10.173", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:24:02.027", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +93,49 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:resort_management_system_project:resort_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5B55CF24-0E9F-4CEA-BAF7-6E26AB8C599E" + } + ] + } + ] + } + ], "references": [ { "url": "https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3318", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.231937", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.231937", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3371.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3371.json index 4e558e16f4a..fb561726f52 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3371.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3371.json @@ -2,12 +2,16 @@ "id": "CVE-2023-3371", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-27T02:15:09.657", - "lastModified": "2023-06-27T02:15:09.657", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:41.447", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The User Registration plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'lock_content_form_handler' and 'display_password_form' function in versions up to, and including, 3.7.3. This makes it possible for unauthenticated attackers to decrypt and view the password protected content." + }, + { + "lang": "es", + "value": "El plugin User Registration para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial debido a la clave de cifrado embebida en las funciones \"lock_content_form_handler\" y \"display_password_form\" en versiones hasta la 3.7.3 inclusive. Esto hace posible que atacantes no autenticados descifren y vean el contenido protegido por contrase\u00f1a. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34098.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34098.json new file mode 100644 index 00000000000..cf7d9455461 --- /dev/null +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34098.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2023-34098", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-06-27T17:15:09.683", + "lastModified": "2023-06-27T17:15:09.683", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Shopware is an open source e-commerce software. Due to an incorrect configuration in the `.htaccess` file, the configuration file of the Javascript could be read in production environments (`themes/package-lock.json`). With this information, the specific Shopware version in a deployment might be determined by an attacker, which could be used for further attacks. Users are advised to update to version 5.7.18. There are no known workarounds for this vulnerability.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/shopware/shopware/security/advisories/GHSA-q97c-2mh3-pgw9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/shopware5/shopware/commit/b3518c8d9562a38615d638f31f79829f6e2f4b6a", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.shopware.com/en/changelog-sw5/#5-7-18", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34099.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34099.json new file mode 100644 index 00000000000..0de3e3a08d2 --- /dev/null +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34099.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2023-34099", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-06-27T17:15:09.813", + "lastModified": "2023-06-27T17:15:09.813", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Shopware is an open source e-commerce software. The mail validation in the registration process had some flaws, so it was possible to construct different mail addresses, that in the end result in the same address, which is shared by multiple accounts. This issue has been addressed in version 5.7.18 and users are advised to update. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/shopware/shopware/security/advisories/GHSA-gh66-fp7j-98v5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/shopware5/shopware/commit/39cc714d9a0be33b43877044d0b88ea3c6b43f3d", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.shopware.com/en/changelog-sw5/#5-7-18", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34158.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34158.json index 828b7afc67a..77e693551a7 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34158.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34158.json @@ -2,19 +2,79 @@ "id": "CVE-2023-34158", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.090", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:24:46.150", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34159.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34159.json index 2ab5097d95b..a2cb8ad9b21 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34159.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34159.json @@ -2,19 +2,74 @@ "id": "CVE-2023-34159", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.130", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T16:49:25.560", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper permission control vulnerability in the Notepad app.Successful exploitation of the vulnerability may lead to privilege escalation, which affects availability and confidentiality." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34160.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34160.json index dec4207c1c7..e925499d84a 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34160.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34160.json @@ -2,19 +2,79 @@ "id": "CVE-2023-34160", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.170", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:21:54.847", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34161.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34161.json index b25dd79d007..74151e6050f 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34161.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34161.json @@ -2,19 +2,89 @@ "id": "CVE-2023-34161", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.207", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:20:04.787", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "nappropriate authorization vulnerability in the SettingsProvider module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2DF07E7F-3A18-4B74-B73D-DF3647C2A48F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34162.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34162.json index 0bda8a4b2d4..3c7124016f6 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34162.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34162.json @@ -2,19 +2,74 @@ "id": "CVE-2023-34162", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.247", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:19:36.387", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Version update determination vulnerability in the user profile module.Successful exploitation of this vulnerability may cause repeated HMS Core updates and cause services to fail." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34163.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34163.json index a05531b6e6b..db0e37bba4f 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34163.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34163.json @@ -2,19 +2,89 @@ "id": "CVE-2023-34163", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.287", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:18:31.273", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Permission control vulnerability in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2DF07E7F-3A18-4B74-B73D-DF3647C2A48F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34166.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34166.json index b0cc69a23de..a31f1b64e34 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34166.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34166.json @@ -2,19 +2,89 @@ "id": "CVE-2023-34166", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.327", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:17:47.017", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Vulnerability of system restart triggered by abnormal callbacks passed to APIs.Successful exploitation of this vulnerability may cause the system to restart." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2DF07E7F-3A18-4B74-B73D-DF3647C2A48F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34167.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34167.json index f7251e910c7..03a8e59ca79 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34167.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34167.json @@ -2,19 +2,89 @@ "id": "CVE-2023-34167", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.367", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:17:06.053", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "511F8CE2-C2B6-4A08-B992-49D9B75B8655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2DF07E7F-3A18-4B74-B73D-DF3647C2A48F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810" + } + ] + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34240.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34240.json new file mode 100644 index 00000000000..c443fc7b666 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34240.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34240", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-06-27T17:15:09.903", + "lastModified": "2023-06-27T17:15:09.903", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cloudexplorer-lite is an open source cloud software stack. Weak passwords can be easily guessed and are an easy target for brute force attacks. This can lead to an authentication system failure and compromise system security. Versions of cloudexplorer-lite prior to 1.2.0 did not enforce strong passwords. This vulnerability has been fixed in version 1.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/security/advisories/GHSA-px4m-5j22-5mw4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34373.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34373.json index 03c96930009..c04e0a929f8 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34373.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34373.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34373", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-19T13:15:09.813", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T16:49:45.007", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zephyr_project_manager_project:zephyr_project_manager:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.3.93", + "matchCriteriaId": "CFC38743-21F8-4A87-8190-296D67F5D55C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-93-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34395.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34395.json index bd571a7f5c5..6694a812c26 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34395.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34395.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34395", "sourceIdentifier": "security@apache.org", "published": "2023-06-27T12:15:13.187", - "lastModified": "2023-06-27T12:15:13.187", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34414.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34414.json index 6f42faade9c..93f218e75bd 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34414.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34414.json @@ -2,31 +2,108 @@ "id": "CVE-2023-34414", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:10.927", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:02:20.343", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The error page for sites with invalid TLS certificates was missing the\nactivation-delay Firefox uses to protect prompts and permission dialogs\nfrom attacks that exploit human response time delays. If a malicious\npage elicited user clicks in precise locations immediately before\nnavigating to a site with a certificate error and made the renderer\nextremely busy at the same time, it could create a gap between when\nthe error page was loaded and when the display actually refreshed.\nWith the right timing the elicited clicks could land in that gap and \nactivate the button that overrides the certificate error for that site. This vulnerability affects Firefox ESR < 102.12, Firefox < 114, and Thunderbird < 102.12." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "114.0", + "matchCriteriaId": "87A5ED08-8A22-4144-8223-261C87F2AEF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "102.12", + "matchCriteriaId": "B3DC7FD5-B031-47F0-AC87-DA4D445F974E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "102.12", + "matchCriteriaId": "20E9EB3F-4BB0-4C7A-A1A8-836E2CA174AD" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1695986", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-19/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-20/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-21/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34415.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34415.json index ee732c782b5..1c14363e740 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34415.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34415.json @@ -2,23 +2,82 @@ "id": "CVE-2023-34415", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:10.980", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:05:48.507", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an \"open redirect\". Firefox no longer follows HTTP redirects to data: URLs. This vulnerability affects Firefox < 114." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "114.0", + "matchCriteriaId": "87A5ED08-8A22-4144-8223-261C87F2AEF4" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811999", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-20/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34416.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34416.json index 156bd21b710..1b47f28a370 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34416.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34416.json @@ -2,31 +2,101 @@ "id": "CVE-2023-34416", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:11.023", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:10:43.233", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Memory safety bugs present in Firefox 113, Firefox ESR 102.11, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.12, Firefox < 114, and Thunderbird < 102.12.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "114.0", + "matchCriteriaId": "87A5ED08-8A22-4144-8223-261C87F2AEF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "102.12", + "matchCriteriaId": "B3DC7FD5-B031-47F0-AC87-DA4D445F974E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "102.12", + "matchCriteriaId": "20E9EB3F-4BB0-4C7A-A1A8-836E2CA174AD" + } + ] + } + ] + } + ], "references": [ - { - "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1752703%2C1818394%2C1826875%2C1827340%2C1827655%2C1828065%2C1830190%2C1830206%2C1830795%2C1833339", - "source": "security@mozilla.org" - }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-19/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-20/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-21/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34417.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34417.json index cf89d9dcf16..e24bcace9f3 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34417.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34417.json @@ -2,23 +2,75 @@ "id": "CVE-2023-34417", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-19T11:15:11.067", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T16:54:49.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Memory safety bugs present in Firefox 113. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 114." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "114.0", + "matchCriteriaId": "87A5ED08-8A22-4144-8223-261C87F2AEF4" + } + ] + } + ] + } + ], "references": [ - { - "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746447%2C1820903%2C1832832", - "source": "security@mozilla.org" - }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-20/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34454.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34454.json index 0200f71d6f1..1826bb5344d 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34454.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34454.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34454", "sourceIdentifier": "security-advisories@github.com", "published": "2023-06-15T17:15:09.873", - "lastModified": "2023-06-15T20:46:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T16:04:04.517", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,26 +66,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xerial:snappy-java:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.10.1", + "matchCriteriaId": "11C2E65C-E284-478A-8D65-351AF645472B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/Snappy.java#L169", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/Snappy.java#L422", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/Snappy.java", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Product" + ] }, { "url": "https://github.com/xerial/snappy-java/commit/d0042551e4a3509a725038eb9b2ad1f683674d94", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xerial/snappy-java/security/advisories/GHSA-fjpj-2g6w-x25r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34455.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34455.json index 5f4954b8014..cf9ecdabb24 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34455.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34455.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34455", "sourceIdentifier": "security-advisories@github.com", "published": "2023-06-15T18:15:09.347", - "lastModified": "2023-06-15T20:46:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T16:08:01.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,22 +66,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xerial:snappy-java:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.10.1", + "matchCriteriaId": "11C2E65C-E284-478A-8D65-351AF645472B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/SnappyInputStream.java#L388", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/SnappyInputStream.java", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/xerial/snappy-java/commit/3bf67857fcf70d9eea56eed4af7c925671e8eaea", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xerial/snappy-java/security/advisories/GHSA-qcwq-55hx-v3vh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34461.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34461.json index 5d366e5db42..5aaf80d9daa 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34461.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34461.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34461", "sourceIdentifier": "security-advisories@github.com", "published": "2023-06-19T18:15:09.763", - "lastModified": "2023-06-20T07:12:55.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T17:09:46.680", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +66,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pybb_project:pybb:0.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "341A74AC-0214-46F8-88B6-9D61E7BB94E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/benjjvi/PyBB/commit/5defd922ab05a193a783392d447c6538628cf854", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/benjjvi/PyBB/security/advisories/GHSA-mv96-w49p-438p", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-348xx/CVE-2023-34830.json b/CVE-2023/CVE-2023-348xx/CVE-2023-34830.json new file mode 100644 index 00000000000..1c7fa795ec6 --- /dev/null +++ b/CVE-2023/CVE-2023-348xx/CVE-2023-34830.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-34830", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-27T17:15:10.033", + "lastModified": "2023-06-27T17:15:10.033", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "i-doit Open v24 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the timeout parameter on the login page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/leekenghwa/CVE-2023-34830---Reflected-XSS-found-in-I-doit-Open-v24-and-below", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@ray.999/cve-2023-34830-reflected-xss-on-i-doit-open-v24-and-below-ad58036f5407", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3405.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3405.json index e530026edb2..e71c80d3fb1 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3405.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3405.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3405", "sourceIdentifier": "security@m-files.com", "published": "2023-06-27T15:15:11.447", - "lastModified": "2023-06-27T15:15:11.447", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3411.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3411.json index 2150d735eb5..6b21c51578f 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3411.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3411.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3411", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-27T04:15:10.267", - "lastModified": "2023-06-27T04:15:10.267", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3412.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3412.json index 3cf62400f2a..4f8f162ccf2 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3412.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3412.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3412", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-27T04:15:10.447", - "lastModified": "2023-06-27T04:15:10.447", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3423.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3423.json index 8f78dfbc078..4cb5a67b51c 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3423.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3423.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3423", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-27T04:15:10.543", - "lastModified": "2023-06-27T04:15:10.543", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3431.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3431.json index c6f3b417759..f703e3d7a7d 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3431.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3431.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3431", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-27T15:15:11.743", - "lastModified": "2023-06-27T15:15:11.743", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3432.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3432.json index 20023b2fcee..3b02be67e5e 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3432.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3432.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3432", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-27T15:15:11.980", - "lastModified": "2023-06-27T15:15:11.980", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35097.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35097.json index bb8a33fb92f..525c46ba635 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35097.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35097.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35097", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-20T10:15:09.657", - "lastModified": "2023-06-20T13:03:08.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T16:54:54.623", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dojo:wp_affiliate_links:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "0.1.1", + "matchCriteriaId": "49FD267F-01B9-4E81-B107-408DF6A97929" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-affiliate-links/wordpress-wp-affiliate-links-plugin-0-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35098.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35098.json index 7146a1e947d..619d02b79a8 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35098.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35098.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35098", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-20T10:15:09.737", - "lastModified": "2023-06-20T13:03:08.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-27T16:54:11.037", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wordpress_nextgen_galleryview_project:wordpress_nextgen_galleryview:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.5.5", + "matchCriteriaId": "8EADB1E2-4F8D-4D15-8F33-95D5004D516A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wordpress-nextgen-galleryview/wordpress-wordpress-nextgen-galleryview-plugin-0-5-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35798.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35798.json index d2cfe9f53f4..935ee720306 100644 --- a/CVE-2023/CVE-2023-357xx/CVE-2023-35798.json +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35798.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35798", "sourceIdentifier": "security@apache.org", "published": "2023-06-27T12:15:13.340", - "lastModified": "2023-06-27T12:15:13.340", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:38.897", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35799.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35799.json new file mode 100644 index 00000000000..10282772b8f --- /dev/null +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35799.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-35799", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-27T17:15:10.110", + "lastModified": "2023-06-27T17:15:10.110", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stormshield Endpoint Security Evolution 2.0.0 through 2.3.2 has Insecure Permissions. An interactive user can use the SES Evolution agent to create arbitrary files with local system privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://advisories.stormshield.eu", + "source": "cve@mitre.org" + }, + { + "url": "https://advisories.stormshield.eu/2023-022/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35800.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35800.json new file mode 100644 index 00000000000..94880bf1e84 --- /dev/null +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35800.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-35800", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-27T17:15:10.170", + "lastModified": "2023-06-27T17:15:10.170", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stormshield Endpoint Security Evolution 2.0.0 through 2.4.2 has Insecure Permissions. An ACL entry on the SES Evolution agent directory that contains the agent logs displayed in the GUI allows interactive users to read data, which could allow access to information reserved to administrators." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://advisories.stormshield.eu", + "source": "cve@mitre.org" + }, + { + "url": "https://advisories.stormshield.eu/2023-021/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35998.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35998.json index eb3d38e4faa..9312111cdcd 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35998.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35998.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35998", "sourceIdentifier": "security@proofpoint.com", "published": "2023-06-27T15:15:10.720", - "lastModified": "2023-06-27T15:15:10.720", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36000.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36000.json index 82c54141d53..989b68ddf34 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36000.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36000.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36000", "sourceIdentifier": "security@proofpoint.com", "published": "2023-06-27T15:15:11.013", - "lastModified": "2023-06-27T15:15:11.013", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36002.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36002.json index 22f5b6b3578..706285a940b 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36002.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36002.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36002", "sourceIdentifier": "security@proofpoint.com", "published": "2023-06-27T15:15:11.187", - "lastModified": "2023-06-27T15:15:11.187", - "vulnStatus": "Received", + "lastModified": "2023-06-27T16:15:35.267", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index aaba2a366b7..8b5864017af 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-27T16:00:27.568906+00:00 +2023-06-27T18:00:32.630488+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-27T15:59:58.483000+00:00 +2023-06-27T17:53:10.120000+00:00 ``` ### Last Data Feed Release @@ -29,69 +29,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -218659 +218666 ``` ### CVEs added in the last Commit -Recently added CVEs: `34` +Recently added CVEs: `7` -* [CVE-2023-2178](CVE-2023/CVE-2023-21xx/CVE-2023-2178.json) (`2023-06-27T14:15:10.540`) -* [CVE-2023-2326](CVE-2023/CVE-2023-23xx/CVE-2023-2326.json) (`2023-06-27T14:15:10.600`) -* [CVE-2023-2482](CVE-2023/CVE-2023-24xx/CVE-2023-2482.json) (`2023-06-27T14:15:10.663`) -* [CVE-2023-2580](CVE-2023/CVE-2023-25xx/CVE-2023-2580.json) (`2023-06-27T14:15:10.730`) -* [CVE-2023-2592](CVE-2023/CVE-2023-25xx/CVE-2023-2592.json) (`2023-06-27T14:15:10.790`) -* [CVE-2023-2601](CVE-2023/CVE-2023-26xx/CVE-2023-2601.json) (`2023-06-27T14:15:10.847`) -* [CVE-2023-2605](CVE-2023/CVE-2023-26xx/CVE-2023-2605.json) (`2023-06-27T14:15:10.910`) -* [CVE-2023-2623](CVE-2023/CVE-2023-26xx/CVE-2023-2623.json) (`2023-06-27T14:15:10.967`) -* [CVE-2023-2624](CVE-2023/CVE-2023-26xx/CVE-2023-2624.json) (`2023-06-27T14:15:11.030`) -* [CVE-2023-2627](CVE-2023/CVE-2023-26xx/CVE-2023-2627.json) (`2023-06-27T14:15:11.090`) -* [CVE-2023-2628](CVE-2023/CVE-2023-26xx/CVE-2023-2628.json) (`2023-06-27T14:15:11.153`) -* [CVE-2023-2711](CVE-2023/CVE-2023-27xx/CVE-2023-2711.json) (`2023-06-27T14:15:11.267`) -* [CVE-2023-2743](CVE-2023/CVE-2023-27xx/CVE-2023-2743.json) (`2023-06-27T14:15:11.373`) -* [CVE-2023-2744](CVE-2023/CVE-2023-27xx/CVE-2023-2744.json) (`2023-06-27T14:15:11.433`) -* [CVE-2023-2795](CVE-2023/CVE-2023-27xx/CVE-2023-2795.json) (`2023-06-27T14:15:11.493`) -* [CVE-2023-2842](CVE-2023/CVE-2023-28xx/CVE-2023-2842.json) (`2023-06-27T14:15:11.567`) -* [CVE-2023-2877](CVE-2023/CVE-2023-28xx/CVE-2023-2877.json) (`2023-06-27T14:15:11.633`) -* [CVE-2023-2996](CVE-2023/CVE-2023-29xx/CVE-2023-2996.json) (`2023-06-27T14:15:11.723`) -* [CVE-2023-2818](CVE-2023/CVE-2023-28xx/CVE-2023-2818.json) (`2023-06-27T15:15:10.350`) -* [CVE-2023-35998](CVE-2023/CVE-2023-359xx/CVE-2023-35998.json) (`2023-06-27T15:15:10.720`) -* [CVE-2023-36000](CVE-2023/CVE-2023-360xx/CVE-2023-36000.json) (`2023-06-27T15:15:11.013`) -* [CVE-2023-36002](CVE-2023/CVE-2023-360xx/CVE-2023-36002.json) (`2023-06-27T15:15:11.187`) -* [CVE-2023-3405](CVE-2023/CVE-2023-34xx/CVE-2023-3405.json) (`2023-06-27T15:15:11.447`) -* [CVE-2023-3431](CVE-2023/CVE-2023-34xx/CVE-2023-3431.json) (`2023-06-27T15:15:11.743`) -* [CVE-2023-3432](CVE-2023/CVE-2023-34xx/CVE-2023-3432.json) (`2023-06-27T15:15:11.980`) +* [CVE-2023-32339](CVE-2023/CVE-2023-323xx/CVE-2023-32339.json) (`2023-06-27T17:15:09.547`) +* [CVE-2023-34098](CVE-2023/CVE-2023-340xx/CVE-2023-34098.json) (`2023-06-27T17:15:09.683`) +* [CVE-2023-34099](CVE-2023/CVE-2023-340xx/CVE-2023-34099.json) (`2023-06-27T17:15:09.813`) +* [CVE-2023-34240](CVE-2023/CVE-2023-342xx/CVE-2023-34240.json) (`2023-06-27T17:15:09.903`) +* [CVE-2023-34830](CVE-2023/CVE-2023-348xx/CVE-2023-34830.json) (`2023-06-27T17:15:10.033`) +* [CVE-2023-35799](CVE-2023/CVE-2023-357xx/CVE-2023-35799.json) (`2023-06-27T17:15:10.110`) +* [CVE-2023-35800](CVE-2023/CVE-2023-358xx/CVE-2023-35800.json) (`2023-06-27T17:15:10.170`) ### CVEs modified in the last Commit -Recently modified CVEs: `78` +Recently modified CVEs: `127` -* [CVE-2022-1323](CVE-2022/CVE-2022-13xx/CVE-2022-1323.json) (`2023-06-27T15:50:04.507`) -* [CVE-2022-0902](CVE-2022/CVE-2022-09xx/CVE-2022-0902.json) (`2023-06-27T15:50:28.677`) -* [CVE-2022-1925](CVE-2022/CVE-2022-19xx/CVE-2022-1925.json) (`2023-06-27T15:50:42.127`) -* [CVE-2022-1924](CVE-2022/CVE-2022-19xx/CVE-2022-1924.json) (`2023-06-27T15:51:15.940`) -* [CVE-2022-1923](CVE-2022/CVE-2022-19xx/CVE-2022-1923.json) (`2023-06-27T15:51:28.127`) -* [CVE-2022-1922](CVE-2022/CVE-2022-19xx/CVE-2022-1922.json) (`2023-06-27T15:54:21.557`) -* [CVE-2022-1025](CVE-2022/CVE-2022-10xx/CVE-2022-1025.json) (`2023-06-27T15:54:30.907`) -* [CVE-2022-4103](CVE-2022/CVE-2022-41xx/CVE-2022-4103.json) (`2023-06-27T15:54:40.787`) -* [CVE-2022-41167](CVE-2022/CVE-2022-411xx/CVE-2022-41167.json) (`2023-06-27T15:55:04.977`) -* [CVE-2022-1794](CVE-2022/CVE-2022-17xx/CVE-2022-1794.json) (`2023-06-27T15:56:43.407`) -* [CVE-2022-1245](CVE-2022/CVE-2022-12xx/CVE-2022-1245.json) (`2023-06-27T15:57:06.270`) -* [CVE-2022-1574](CVE-2022/CVE-2022-15xx/CVE-2022-1574.json) (`2023-06-27T15:57:30.970`) -* [CVE-2022-1572](CVE-2022/CVE-2022-15xx/CVE-2022-1572.json) (`2023-06-27T15:57:42.557`) -* [CVE-2022-1720](CVE-2022/CVE-2022-17xx/CVE-2022-1720.json) (`2023-06-27T15:57:54.307`) -* [CVE-2022-2023](CVE-2022/CVE-2022-20xx/CVE-2022-2023.json) (`2023-06-27T15:58:07.787`) -* [CVE-2023-34613](CVE-2023/CVE-2023-346xx/CVE-2023-34613.json) (`2023-06-27T14:53:34.677`) -* [CVE-2023-34614](CVE-2023/CVE-2023-346xx/CVE-2023-34614.json) (`2023-06-27T15:03:32.087`) -* [CVE-2023-34616](CVE-2023/CVE-2023-346xx/CVE-2023-34616.json) (`2023-06-27T15:15:16.007`) -* [CVE-2023-35882](CVE-2023/CVE-2023-358xx/CVE-2023-35882.json) (`2023-06-27T15:16:07.943`) -* [CVE-2023-35878](CVE-2023/CVE-2023-358xx/CVE-2023-35878.json) (`2023-06-27T15:16:31.900`) -* [CVE-2023-34620](CVE-2023/CVE-2023-346xx/CVE-2023-34620.json) (`2023-06-27T15:22:58.187`) -* [CVE-2023-34623](CVE-2023/CVE-2023-346xx/CVE-2023-34623.json) (`2023-06-27T15:27:27.380`) -* [CVE-2023-34615](CVE-2023/CVE-2023-346xx/CVE-2023-34615.json) (`2023-06-27T15:34:28.360`) -* [CVE-2023-35844](CVE-2023/CVE-2023-358xx/CVE-2023-35844.json) (`2023-06-27T15:48:14.627`) -* [CVE-2023-34453](CVE-2023/CVE-2023-344xx/CVE-2023-34453.json) (`2023-06-27T15:59:58.483`) +* [CVE-2023-2326](CVE-2023/CVE-2023-23xx/CVE-2023-2326.json) (`2023-06-27T16:15:38.897`) +* [CVE-2023-2482](CVE-2023/CVE-2023-24xx/CVE-2023-2482.json) (`2023-06-27T16:15:38.897`) +* [CVE-2023-2580](CVE-2023/CVE-2023-25xx/CVE-2023-2580.json) (`2023-06-27T16:15:38.897`) +* [CVE-2023-2592](CVE-2023/CVE-2023-25xx/CVE-2023-2592.json) (`2023-06-27T16:15:38.897`) +* [CVE-2023-3371](CVE-2023/CVE-2023-33xx/CVE-2023-3371.json) (`2023-06-27T16:15:41.447`) +* [CVE-2023-33213](CVE-2023/CVE-2023-332xx/CVE-2023-33213.json) (`2023-06-27T16:41:03.113`) +* [CVE-2023-34159](CVE-2023/CVE-2023-341xx/CVE-2023-34159.json) (`2023-06-27T16:49:25.560`) +* [CVE-2023-34373](CVE-2023/CVE-2023-343xx/CVE-2023-34373.json) (`2023-06-27T16:49:45.007`) +* [CVE-2023-35098](CVE-2023/CVE-2023-350xx/CVE-2023-35098.json) (`2023-06-27T16:54:11.037`) +* [CVE-2023-34417](CVE-2023/CVE-2023-344xx/CVE-2023-34417.json) (`2023-06-27T16:54:49.537`) +* [CVE-2023-35097](CVE-2023/CVE-2023-350xx/CVE-2023-35097.json) (`2023-06-27T16:54:54.623`) +* [CVE-2023-34414](CVE-2023/CVE-2023-344xx/CVE-2023-34414.json) (`2023-06-27T17:02:20.343`) +* [CVE-2023-34415](CVE-2023/CVE-2023-344xx/CVE-2023-34415.json) (`2023-06-27T17:05:48.507`) +* [CVE-2023-3315](CVE-2023/CVE-2023-33xx/CVE-2023-3315.json) (`2023-06-27T17:08:44.067`) +* [CVE-2023-34461](CVE-2023/CVE-2023-344xx/CVE-2023-34461.json) (`2023-06-27T17:09:46.680`) +* [CVE-2023-34416](CVE-2023/CVE-2023-344xx/CVE-2023-34416.json) (`2023-06-27T17:10:43.233`) +* [CVE-2023-34167](CVE-2023/CVE-2023-341xx/CVE-2023-34167.json) (`2023-06-27T17:17:06.053`) +* [CVE-2023-34166](CVE-2023/CVE-2023-341xx/CVE-2023-34166.json) (`2023-06-27T17:17:47.017`) +* [CVE-2023-34163](CVE-2023/CVE-2023-341xx/CVE-2023-34163.json) (`2023-06-27T17:18:31.273`) +* [CVE-2023-34162](CVE-2023/CVE-2023-341xx/CVE-2023-34162.json) (`2023-06-27T17:19:36.387`) +* [CVE-2023-34161](CVE-2023/CVE-2023-341xx/CVE-2023-34161.json) (`2023-06-27T17:20:04.787`) +* [CVE-2023-34160](CVE-2023/CVE-2023-341xx/CVE-2023-34160.json) (`2023-06-27T17:21:54.847`) +* [CVE-2023-3318](CVE-2023/CVE-2023-33xx/CVE-2023-3318.json) (`2023-06-27T17:24:02.027`) +* [CVE-2023-34158](CVE-2023/CVE-2023-341xx/CVE-2023-34158.json) (`2023-06-27T17:24:46.150`) +* [CVE-2023-3291](CVE-2023/CVE-2023-32xx/CVE-2023-3291.json) (`2023-06-27T17:53:10.120`) ## Download and Usage