mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2023-04-27T18:00:25.219432+00:00
This commit is contained in:
parent
ea7460621c
commit
9b6d722587
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-25032",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-03-25T09:15:08.187",
|
||||
"lastModified": "2023-02-11T17:44:46.857",
|
||||
"lastModified": "2023-04-27T17:50:02.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -691,6 +691,52 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "850B5359-7804-406B-9DC9-D22D65ACEE40"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5522AD81-A23E-47D3-82E4-6D71ECEB1DBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AC61C25-871B-4F6F-A5F0-77359F373681"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12A59E25-5ED3-4A6D-95F6-45750866E0D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC0DC492-706E-42FE-8757-71873B53C417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21426",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-04-19T21:15:15.157",
|
||||
"lastModified": "2022-07-28T17:00:28.430",
|
||||
"lastModified": "2023-04-27T17:53:04.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -252,6 +252,56 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "850B5359-7804-406B-9DC9-D22D65ACEE40"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5522AD81-A23E-47D3-82E4-6D71ECEB1DBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AC61C25-871B-4F6F-A5F0-77359F373681"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12A59E25-5ED3-4A6D-95F6-45750866E0D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC0DC492-706E-42FE-8757-71873B53C417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:18.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AD8BF00-C510-4E63-8949-CB64E9043610"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21434",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-04-19T21:15:15.387",
|
||||
"lastModified": "2022-07-28T17:03:03.207",
|
||||
"lastModified": "2023-04-27T17:52:30.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -252,6 +252,56 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "850B5359-7804-406B-9DC9-D22D65ACEE40"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5522AD81-A23E-47D3-82E4-6D71ECEB1DBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AC61C25-871B-4F6F-A5F0-77359F373681"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12A59E25-5ED3-4A6D-95F6-45750866E0D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC0DC492-706E-42FE-8757-71873B53C417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:18.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AD8BF00-C510-4E63-8949-CB64E9043610"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21443",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-04-19T21:15:15.800",
|
||||
"lastModified": "2022-10-06T02:43:55.687",
|
||||
"lastModified": "2023-04-27T17:50:39.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -252,6 +252,57 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "850B5359-7804-406B-9DC9-D22D65ACEE40"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5522AD81-A23E-47D3-82E4-6D71ECEB1DBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AC61C25-871B-4F6F-A5F0-77359F373681"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12A59E25-5ED3-4A6D-95F6-45750866E0D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC0DC492-706E-42FE-8757-71873B53C417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:18.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AD8BF00-C510-4E63-8949-CB64E9043610"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21449",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-04-19T21:15:16.127",
|
||||
"lastModified": "2022-05-13T12:55:07.697",
|
||||
"lastModified": "2023-04-27T17:52:20.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -220,6 +220,31 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:18.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AD8BF00-C510-4E63-8949-CB64E9043610"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21476",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-04-19T21:15:17.503",
|
||||
"lastModified": "2022-10-06T02:58:00.350",
|
||||
"lastModified": "2023-04-27T17:51:31.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -252,6 +252,47 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5522AD81-A23E-47D3-82E4-6D71ECEB1DBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AC61C25-871B-4F6F-A5F0-77359F373681"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12A59E25-5ED3-4A6D-95F6-45750866E0D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC0DC492-706E-42FE-8757-71873B53C417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21496",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-04-19T21:15:18.497",
|
||||
"lastModified": "2022-10-06T03:00:33.120",
|
||||
"lastModified": "2023-04-27T17:52:00.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -262,6 +262,57 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "850B5359-7804-406B-9DC9-D22D65ACEE40"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5522AD81-A23E-47D3-82E4-6D71ECEB1DBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AC61C25-871B-4F6F-A5F0-77359F373681"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12A59E25-5ED3-4A6D-95F6-45750866E0D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC0DC492-706E-42FE-8757-71873B53C417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:18.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AD8BF00-C510-4E63-8949-CB64E9043610"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21540",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-07-19T22:15:11.730",
|
||||
"lastModified": "2022-08-22T15:09:00.537",
|
||||
"lastModified": "2023-04-27T17:35:22.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -862,73 +862,43 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.49:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DCB7D337-B3E6-4BCE-8249-0473D2DE08BC"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.47:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E4633C4-E552-439D-8FE4-139E3A7956CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.55:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52AFAB07-AC29-4913-8F98-84A3D665A6FC"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50C77346-8893-44F0-B0D1-5D4D30A9CA3B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.62:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63E58DE0-A96A-452E-986F-3BD2FEA7C723"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.63:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A989A711-6140-44BE-9BF9-1C09EE6E3B01"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.56:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3FB1BF4-3FCF-4007-A9E3-97C35483D6A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.48:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD7A33EC-DE03-424F-9796-E5EA071FF6CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.57:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71F08EDB-E02B-4FAE-99A5-15EE073F533C"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCDAFFA9-0AA4-4C70-9154-8DA4BB255FD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6302149-28AA-481E-BC6C-87D05E73768A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.49:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E6BBD51-8B01-458E-B76B-B2AC933052C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.41:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50ED6589-FFBD-4D06-92A1-9DAB8C493D46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.35:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "706192CB-91B4-4D31-8715-B6FAAA34C7CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:18.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E692919-EA06-4C94-8726-5577626A18EF"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:18.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20DFD9D8-8648-40F7-81B8-04F852A337FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21541",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-07-19T22:15:11.783",
|
||||
"lastModified": "2022-08-22T15:09:40.513",
|
||||
"lastModified": "2023-04-27T17:36:38.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -862,68 +862,38 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.55:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52AFAB07-AC29-4913-8F98-84A3D665A6FC"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50C77346-8893-44F0-B0D1-5D4D30A9CA3B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.62:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63E58DE0-A96A-452E-986F-3BD2FEA7C723"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.63:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A989A711-6140-44BE-9BF9-1C09EE6E3B01"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.56:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3FB1BF4-3FCF-4007-A9E3-97C35483D6A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.48:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD7A33EC-DE03-424F-9796-E5EA071FF6CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.57:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71F08EDB-E02B-4FAE-99A5-15EE073F533C"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCDAFFA9-0AA4-4C70-9154-8DA4BB255FD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6302149-28AA-481E-BC6C-87D05E73768A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.49:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E6BBD51-8B01-458E-B76B-B2AC933052C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.41:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50ED6589-FFBD-4D06-92A1-9DAB8C493D46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.35:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "706192CB-91B4-4D31-8715-B6FAAA34C7CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:18.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E692919-EA06-4C94-8726-5577626A18EF"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:18.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20DFD9D8-8648-40F7-81B8-04F852A337FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21549",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-07-19T22:15:12.147",
|
||||
"lastModified": "2022-08-22T15:08:41.367",
|
||||
"lastModified": "2023-04-27T17:34:01.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -89,13 +89,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.35:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "706192CB-91B4-4D31-8715-B6FAAA34C7CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6302149-28AA-481E-BC6C-87D05E73768A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21618",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-10-18T21:15:12.757",
|
||||
"lastModified": "2022-12-08T15:55:45.877",
|
||||
"lastModified": "2023-04-27T17:37:47.360",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -167,6 +167,41 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:19.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B394E478-B822-488E-B74B-F46C4DB2B1A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21619",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-10-18T21:15:12.810",
|
||||
"lastModified": "2022-12-08T15:56:01.790",
|
||||
"lastModified": "2023-04-27T17:37:27.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -212,6 +212,51 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:19.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B394E478-B822-488E-B74B-F46C4DB2B1A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21624",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-10-18T21:15:13.657",
|
||||
"lastModified": "2022-12-08T15:56:09.653",
|
||||
"lastModified": "2023-04-27T17:45:14.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -207,6 +207,56 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.49:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DCB7D337-B3E6-4BCE-8249-0473D2DE08BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:19.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B394E478-B822-488E-B74B-F46C4DB2B1A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21626",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-10-18T21:15:13.770",
|
||||
"lastModified": "2022-12-08T15:56:18.160",
|
||||
"lastModified": "2023-04-27T17:37:07.933",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -187,6 +187,46 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.49:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DCB7D337-B3E6-4BCE-8249-0473D2DE08BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-21628",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-10-18T21:15:13.887",
|
||||
"lastModified": "2022-12-08T15:56:24.393",
|
||||
"lastModified": "2023-04-27T17:46:04.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -207,6 +207,56 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.49:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DCB7D337-B3E6-4BCE-8249-0473D2DE08BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:19.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B394E478-B822-488E-B74B-F46C4DB2B1A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-34169",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-07-19T18:15:11.740",
|
||||
"lastModified": "2022-11-29T02:07:19.047",
|
||||
"lastModified": "2023-04-27T17:36:52.673",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -883,73 +883,43 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.49:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DCB7D337-B3E6-4BCE-8249-0473D2DE08BC"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.47:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E4633C4-E552-439D-8FE4-139E3A7956CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.55:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52AFAB07-AC29-4913-8F98-84A3D665A6FC"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50C77346-8893-44F0-B0D1-5D4D30A9CA3B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.62:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63E58DE0-A96A-452E-986F-3BD2FEA7C723"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.63:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A989A711-6140-44BE-9BF9-1C09EE6E3B01"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.56:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3FB1BF4-3FCF-4007-A9E3-97C35483D6A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.48:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD7A33EC-DE03-424F-9796-E5EA071FF6CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.57:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71F08EDB-E02B-4FAE-99A5-15EE073F533C"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCDAFFA9-0AA4-4C70-9154-8DA4BB255FD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6302149-28AA-481E-BC6C-87D05E73768A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.49:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E6BBD51-8B01-458E-B76B-B2AC933052C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.41:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50ED6589-FFBD-4D06-92A1-9DAB8C493D46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.35:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "706192CB-91B4-4D31-8715-B6FAAA34C7CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:18.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E692919-EA06-4C94-8726-5577626A18EF"
|
||||
"criteria": "cpe:2.3:a:azul:zulu:18.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20DFD9D8-8648-40F7-81B8-04F852A337FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39399",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2022-10-18T21:15:14.730",
|
||||
"lastModified": "2022-12-08T15:56:35.367",
|
||||
"lastModified": "2023-04-27T17:47:44.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -187,6 +187,41 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:19.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B394E478-B822-488E-B74B-F46C4DB2B1A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-21830",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-01-18T00:15:12.873",
|
||||
"lastModified": "2023-01-24T19:29:45.927",
|
||||
"lastModified": "2023-04-27T17:49:17.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -111,6 +111,31 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68C21354-003A-4BEC-8641-9BF2BD1D04F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.57:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08F84DE8-7A9F-444A-A73F-9022C11EDCA3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.66:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D9894F71-FE59-42D8-BD29-7269034328C7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-21835",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-01-18T00:15:13.147",
|
||||
"lastModified": "2023-01-24T19:29:23.600",
|
||||
"lastModified": "2023-04-27T17:48:26.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -101,6 +101,41 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B47BECB1-5502-490C-8BF1-E4F673802228"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BC1D121-AD8E-41F9-A4EA-26889ADDF0FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.44:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EDAAB21D-17E7-4FF5-B31C-BFD7EBF6505B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04C2FA3F-7CAC-45E2-B2ED-FA6C98884C5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:19.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECD5B562-AB32-477D-B46D-F3E41A43A809"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-21843",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-01-18T00:15:13.717",
|
||||
"lastModified": "2023-01-24T19:23:25.517",
|
||||
"lastModified": "2023-04-27T17:49:30.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -131,6 +131,56 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:6.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68C21354-003A-4BEC-8641-9BF2BD1D04F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:7.57:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08F84DE8-7A9F-444A-A73F-9022C11EDCA3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:8.66:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D9894F71-FE59-42D8-BD29-7269034328C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:11.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B47BECB1-5502-490C-8BF1-E4F673802228"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:13.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BC1D121-AD8E-41F9-A4EA-26889ADDF0FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:15.44:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EDAAB21D-17E7-4FF5-B31C-BFD7EBF6505B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:17.38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04C2FA3F-7CAC-45E2-B2ED-FA6C98884C5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:azul:zulu:19.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECD5B562-AB32-477D-B46D-F3E41A43A809"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22307",
|
||||
"sourceIdentifier": "security@checkmk.com",
|
||||
"published": "2023-04-18T19:15:07.120",
|
||||
"lastModified": "2023-04-18T19:40:03.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T17:34:42.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@checkmk.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@checkmk.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +80,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tribe29:checkmk_appliance_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.6.4",
|
||||
"matchCriteriaId": "3275F8D1-2252-4524-B04A-9F7D0B23D715"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://checkmk.com/werk/9522",
|
||||
"source": "security@checkmk.com"
|
||||
"source": "security@checkmk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2349.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2349.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2349",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-27T16:15:11.063",
|
||||
"lastModified": "2023-04-27T16:26:09.020",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in SourceCodester Service Provider Management System 1.0. Affected is an unknown function of the file /admin/index.php. The manipulation of the argument page leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227592."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%204.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227592",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227592",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2350.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2350.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2350",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-27T16:15:11.207",
|
||||
"lastModified": "2023-04-27T16:26:09.020",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in SourceCodester Service Provider Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Users.php. The manipulation of the argument id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227593 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%205.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227593",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227593",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25555",
|
||||
"sourceIdentifier": "cybersecurity@se.com",
|
||||
"published": "2023-04-18T21:15:08.910",
|
||||
"lastModified": "2023-04-18T21:25:05.953",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T17:58:26.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "7.9.2",
|
||||
"matchCriteriaId": "9DCD63E5-0A70-47B2-9F4F-5328E0BD04B0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf",
|
||||
"source": "cybersecurity@se.com"
|
||||
"source": "cybersecurity@se.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,76 @@
|
||||
"id": "CVE-2023-29855",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-18T18:15:07.547",
|
||||
"lastModified": "2023-04-18T19:40:03.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T16:48:18.493",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WBCE CMS 1.5.3 has a command execution vulnerability via admin/languages/install.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wbce:wbce_cms:1.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "37C64E93-0C2F-4BB4-BF53-1E7F781D1116"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WBCE/WBCE_CMS/issues/544",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,76 @@
|
||||
"id": "CVE-2023-29887",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-18T20:15:19.917",
|
||||
"lastModified": "2023-04-18T20:37:55.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T17:15:31.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Local File inclusion vulnerability in test.php in spreadsheet-reader 0.5.11 allows remote attackers to include arbitrary files via the File parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nuovo:spreadsheet-reader:0.5.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A98E674-A1ED-4B77-8A2B-2322423D0852"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://research.hisolutions.com/2023/01/arbitrary-file-read-vulnerability-php-library-nuovo-spreadsheet-reader-0-5-11/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30539",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-17T22:15:10.210",
|
||||
"lastModified": "2023-04-18T03:15:28.387",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T16:40:57.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -36,8 +56,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -46,22 +76,130 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_files_automated_tagging:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.14.0",
|
||||
"versionEndExcluding": "1.14.2",
|
||||
"matchCriteriaId": "1C665CB5-94A9-4916-AC88-9C9F9F8A4778"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_files_automated_tagging:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.15.0",
|
||||
"versionEndExcluding": "1.15.3",
|
||||
"matchCriteriaId": "376831D6-33D5-431A-BFFB-036784A9D08D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_files_automated_tagging:1.11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C83F62E-7C71-4230-9F8E-B79C0AE821A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_files_automated_tagging:1.12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6A915FBA-4292-4D7A-9D13-446E95773A9C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_files_automated_tagging:1.13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD21F977-90E4-4E1D-A5A8-2ABE9D530807"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_files_automated_tagging:1.16.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB632467-6671-4E24-ACAA-1CF780340A2F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "21.0.0",
|
||||
"versionEndExcluding": "21.0.9.11",
|
||||
"matchCriteriaId": "CCFF2EE4-A5E2-4C88-9E4E-F442E567166C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "22.0.0",
|
||||
"versionEndExcluding": "22.2.10.11",
|
||||
"matchCriteriaId": "59DDD98F-8315-4CA0-9360-E05B0B790086"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.12.6",
|
||||
"matchCriteriaId": "CE1029E7-ACE9-4547-A18D-10300912A87B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.11",
|
||||
"matchCriteriaId": "F826F841-9E60-44B7-81F0-77E552CC2BAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.11",
|
||||
"matchCriteriaId": "6A5FB4F4-16FC-4B98-897C-4DA109899A28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "25.0.0",
|
||||
"versionEndExcluding": "25.0.5",
|
||||
"matchCriteriaId": "8B9FE0C2-3437-42C6-9F9E-84DB8AC4D3B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "25.0.0",
|
||||
"versionEndExcluding": "25.0.5",
|
||||
"matchCriteriaId": "88FDB61B-A9D8-4762-B6DD-A6FFF347E0B7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nextcloud/files_automatedtagging/pull/705",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m2f-v8x7-9w99",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nextcloud/server/pull/37252",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1895976",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-306xx/CVE-2023-30624.json
Normal file
59
CVE-2023/CVE-2023-306xx/CVE-2023-30624.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-30624",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-27T17:15:08.737",
|
||||
"lastModified": "2023-04-27T17:15:08.737",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Wasmtime is a standalone runtime for WebAssembly. Prior to versions 6.0.2, 7.0.1, and 8.0.1, Wasmtime's implementation of managing per-instance state, such as tables and memories, contains LLVM-level undefined behavior. This undefined behavior was found to cause runtime-level issues when compiled with LLVM 16 which causes some writes, which are critical for correctness, to be optimized away. Vulnerable versions of Wasmtime compiled with Rust 1.70, which is currently in beta, or later are known to have incorrectly compiled functions. Versions of Wasmtime compiled with the current Rust stable release, 1.69, and prior are not known at this time to have any issues, but can theoretically exhibit potential issues.\n\nThe underlying problem is that Wasmtime's runtime state for an instance involves a Rust-defined structure called `Instance` which has a trailing `VMContext` structure after it. This `VMContext` structure has a runtime-defined layout that is unique per-module. This representation cannot be expressed with safe code in Rust so `unsafe` code is required to maintain this state. The code doing this, however, has methods which take `&self` as an argument but modify data in the `VMContext` part of the allocation. This means that pointers derived from `&self` are mutated. This is typically not allowed, except in the presence of `UnsafeCell`, in Rust. When compiled to LLVM these functions have `noalias readonly` parameters which means it's UB to write through the pointers.\n\nWasmtime's internal representation and management of `VMContext` has been updated to use `&mut self` methods where appropriate. Additionally verification tools for `unsafe` code in Rust, such as `cargo miri`, are planned to be executed on the `main` branch soon to fix any Rust-level issues that may be exploited in future compiler versions.\n\nPrecomplied binaries available for Wasmtime from GitHub releases have been compiled with at most LLVM 15 so are not known to be vulnerable. As mentioned above, however, it's still recommended to update.\n\nWasmtime version 6.0.2, 7.0.1, and 8.0.1 have been issued which contain the patch necessary to work correctly on LLVM 16 and have no known UB on LLVM 15 and earlier. If Wasmtime is compiled with Rust 1.69 and prior, which use LLVM 15, then there are no known issues. There is a theoretical possibility for undefined behavior to exploited, however, so it's recommended that users upgrade to a patched version of Wasmtime. Users using beta Rust (1.70 at this time) or nightly Rust (1.71 at this time) must update to a patched version to work correctly."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.9,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-758"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/bytecodealliance/wasmtime/commit/0977952dcd9d482bff7c288868ccb52769b3a92e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-ch89-5g45-qwc7",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2023/CVE-2023-308xx/CVE-2023-30848.json
Normal file
63
CVE-2023/CVE-2023-308xx/CVE-2023-30848.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-30848",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-27T16:15:11.273",
|
||||
"lastModified": "2023-04-27T16:26:09.020",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pimcore is an open source data and experience management platform. Prior to version 10.5.21, the admin search find API has a SQL injection vulnerability. Users should upgrade to version 10.5.21 to receive a patch or, as a workaround, apply the patch manually."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/commit/25ad8674886f2b938243cbe13e33e204a2e35cc3.patch",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/pull/14972",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-6mhm-gcpf-5gr8",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2023/CVE-2023-308xx/CVE-2023-30849.json
Normal file
63
CVE-2023/CVE-2023-308xx/CVE-2023-30849.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-30849",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-27T16:15:11.330",
|
||||
"lastModified": "2023-04-27T16:26:09.020",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pimcore is an open source data and experience management platform. Prior to version 10.5.21, A SQL injection vulnerability exists in the translation export API. Users should update to version 10.5.21 to receive a patch or, as a workaround, or apply the patch manually."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/commit/c6c80905e58c7724c776f980570a56df7016c6d1.patch",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/pull/14968",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-xmg8-w465-mr56",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2023/CVE-2023-308xx/CVE-2023-30850.json
Normal file
63
CVE-2023/CVE-2023-308xx/CVE-2023-30850.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-30850",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-27T17:15:08.880",
|
||||
"lastModified": "2023-04-27T17:15:08.880",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pimcore is an open source data and experience management platform. Prior to version 10.5.21, a SQL Injection vulnerability exists in the admin translations API. Users should update to version 10.5.21 to receive a patch or, as a workaround, or apply the patch manually."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/commit/7e32cc28145274ddfc30fb791012d26c1278bd38.patch",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/pull/14952",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-jwg4-qcgv-5wg6",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2023/CVE-2023-308xx/CVE-2023-30852.json
Normal file
63
CVE-2023/CVE-2023-308xx/CVE-2023-30852.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-30852",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-27T17:15:08.957",
|
||||
"lastModified": "2023-04-27T17:15:08.957",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pimcore is an open source data and experience management platform. Prior to version 10.5.21, the `/admin/misc/script-proxy` API endpoint that is accessible by an authenticated administrator user is vulnerable to arbitrary JavaScript and CSS file read via the `scriptPath` and `scripts` parameters. The `scriptPath` parameter is not sanitized properly and is vulnerable to path traversal attack. Any JavaScript/CSS file from the application server can be read by specifying sufficient number of `../` patterns to go out from the application webroot followed by path of the folder where the file is located in the \"scriptPath\" parameter and the file name in the \"scripts\" parameter. The JavaScript file is successfully read only if the web application has read access to it. Users should update to version 10.5.21 to receive a patch or, as a workaround, apply the patch manual."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/commit/498cadec2292f7842fb10612068ac78496e884b4.patch",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/pull/14959",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-j5c3-r84f-9596",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
118
README.md
118
README.md
@ -1,7 +1,7 @@
|
||||
# nvd-json-data-feeds
|
||||
|
||||
Community reconstruction of the soon-to-be deprecated JSON NVD Data Feeds.
|
||||
[Releases](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) each day at 00:00 AM UTC.
|
||||
[Releases](releases/latest) each day at 00:00 AM UTC.
|
||||
Repository synchronizes with the NVD every 2 hours.
|
||||
|
||||
## Repository at a Glance
|
||||
@ -9,18 +9,18 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-04-27T16:00:23.761077+00:00
|
||||
2023-04-27T18:00:25.219432+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-04-27T15:58:36.043000+00:00
|
||||
2023-04-27T17:58:26.807000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
Download and Changelog: [Click](releases/latest)
|
||||
|
||||
```plain
|
||||
2023-04-27T00:00:20.965588+00:00
|
||||
@ -29,89 +29,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
213678
|
||||
213685
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
* [CVE-2023-2341](CVE-2023/CVE-2023-23xx/CVE-2023-2341.json) (`2023-04-27T14:15:09.083`)
|
||||
* [CVE-2023-2342](CVE-2023/CVE-2023-23xx/CVE-2023-2342.json) (`2023-04-27T14:15:09.137`)
|
||||
* [CVE-2023-2343](CVE-2023/CVE-2023-23xx/CVE-2023-2343.json) (`2023-04-27T14:15:09.187`)
|
||||
* [CVE-2023-2344](CVE-2023/CVE-2023-23xx/CVE-2023-2344.json) (`2023-04-27T14:15:09.240`)
|
||||
* [CVE-2023-2345](CVE-2023/CVE-2023-23xx/CVE-2023-2345.json) (`2023-04-27T15:15:13.187`)
|
||||
* [CVE-2023-2346](CVE-2023/CVE-2023-23xx/CVE-2023-2346.json) (`2023-04-27T15:15:13.400`)
|
||||
* [CVE-2023-2347](CVE-2023/CVE-2023-23xx/CVE-2023-2347.json) (`2023-04-27T15:15:13.617`)
|
||||
* [CVE-2023-2348](CVE-2023/CVE-2023-23xx/CVE-2023-2348.json) (`2023-04-27T15:15:13.723`)
|
||||
* [CVE-2023-24966](CVE-2023/CVE-2023-249xx/CVE-2023-24966.json) (`2023-04-27T14:15:09.013`)
|
||||
* [CVE-2023-30338](CVE-2023/CVE-2023-303xx/CVE-2023-30338.json) (`2023-04-27T15:15:13.787`)
|
||||
* [CVE-2023-30349](CVE-2023/CVE-2023-303xx/CVE-2023-30349.json) (`2023-04-27T14:15:09.320`)
|
||||
* [CVE-2023-30847](CVE-2023/CVE-2023-308xx/CVE-2023-30847.json) (`2023-04-27T15:15:13.833`)
|
||||
* [CVE-2023-2349](CVE-2023/CVE-2023-23xx/CVE-2023-2349.json) (`2023-04-27T16:15:11.063`)
|
||||
* [CVE-2023-2350](CVE-2023/CVE-2023-23xx/CVE-2023-2350.json) (`2023-04-27T16:15:11.207`)
|
||||
* [CVE-2023-30624](CVE-2023/CVE-2023-306xx/CVE-2023-30624.json) (`2023-04-27T17:15:08.737`)
|
||||
* [CVE-2023-30848](CVE-2023/CVE-2023-308xx/CVE-2023-30848.json) (`2023-04-27T16:15:11.273`)
|
||||
* [CVE-2023-30849](CVE-2023/CVE-2023-308xx/CVE-2023-30849.json) (`2023-04-27T16:15:11.330`)
|
||||
* [CVE-2023-30850](CVE-2023/CVE-2023-308xx/CVE-2023-30850.json) (`2023-04-27T17:15:08.880`)
|
||||
* [CVE-2023-30852](CVE-2023/CVE-2023-308xx/CVE-2023-30852.json) (`2023-04-27T17:15:08.957`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `58`
|
||||
Recently modified CVEs: `25`
|
||||
|
||||
* [CVE-2019-13263](CVE-2019/CVE-2019-132xx/CVE-2019-13263.json) (`2023-04-27T14:29:10.147`)
|
||||
* [CVE-2019-13264](CVE-2019/CVE-2019-132xx/CVE-2019-13264.json) (`2023-04-27T14:29:21.177`)
|
||||
* [CVE-2019-13265](CVE-2019/CVE-2019-132xx/CVE-2019-13265.json) (`2023-04-27T14:30:15.520`)
|
||||
* [CVE-2019-9122](CVE-2019/CVE-2019-91xx/CVE-2019-9122.json) (`2023-04-27T14:30:48.700`)
|
||||
* [CVE-2020-29557](CVE-2020/CVE-2020-295xx/CVE-2020-29557.json) (`2023-04-27T14:31:11.407`)
|
||||
* [CVE-2021-39537](CVE-2021/CVE-2021-395xx/CVE-2021-39537.json) (`2023-04-27T15:15:09.233`)
|
||||
* [CVE-2021-40506](CVE-2021/CVE-2021-405xx/CVE-2021-40506.json) (`2023-04-27T15:41:16.207`)
|
||||
* [CVE-2021-40507](CVE-2021/CVE-2021-405xx/CVE-2021-40507.json) (`2023-04-27T15:41:19.827`)
|
||||
* [CVE-2022-0812](CVE-2022/CVE-2022-08xx/CVE-2022-0812.json) (`2023-04-27T15:15:09.357`)
|
||||
* [CVE-2022-37434](CVE-2022/CVE-2022-374xx/CVE-2022-37434.json) (`2023-04-27T15:15:09.470`)
|
||||
* [CVE-2022-41862](CVE-2022/CVE-2022-418xx/CVE-2022-41862.json) (`2023-04-27T15:15:09.667`)
|
||||
* [CVE-2022-43548](CVE-2022/CVE-2022-435xx/CVE-2022-43548.json) (`2023-04-27T15:15:09.797`)
|
||||
* [CVE-2022-43551](CVE-2022/CVE-2022-435xx/CVE-2022-43551.json) (`2023-04-27T15:15:09.903`)
|
||||
* [CVE-2022-46640](CVE-2022/CVE-2022-466xx/CVE-2022-46640.json) (`2023-04-27T15:54:56.623`)
|
||||
* [CVE-2023-0215](CVE-2023/CVE-2023-02xx/CVE-2023-0215.json) (`2023-04-27T15:15:09.993`)
|
||||
* [CVE-2023-0482](CVE-2023/CVE-2023-04xx/CVE-2023-0482.json) (`2023-04-27T15:15:10.077`)
|
||||
* [CVE-2023-1281](CVE-2023/CVE-2023-12xx/CVE-2023-1281.json) (`2023-04-27T15:15:10.157`)
|
||||
* [CVE-2023-2150](CVE-2023/CVE-2023-21xx/CVE-2023-2150.json) (`2023-04-27T14:48:37.427`)
|
||||
* [CVE-2023-2151](CVE-2023/CVE-2023-21xx/CVE-2023-2151.json) (`2023-04-27T14:54:32.557`)
|
||||
* [CVE-2023-21911](CVE-2023/CVE-2023-219xx/CVE-2023-21911.json) (`2023-04-27T15:15:10.263`)
|
||||
* [CVE-2023-21912](CVE-2023/CVE-2023-219xx/CVE-2023-21912.json) (`2023-04-27T15:15:10.400`)
|
||||
* [CVE-2023-21913](CVE-2023/CVE-2023-219xx/CVE-2023-21913.json) (`2023-04-27T15:15:10.487`)
|
||||
* [CVE-2023-21917](CVE-2023/CVE-2023-219xx/CVE-2023-21917.json) (`2023-04-27T15:15:10.560`)
|
||||
* [CVE-2023-21919](CVE-2023/CVE-2023-219xx/CVE-2023-21919.json) (`2023-04-27T15:15:10.633`)
|
||||
* [CVE-2023-21920](CVE-2023/CVE-2023-219xx/CVE-2023-21920.json) (`2023-04-27T15:15:10.703`)
|
||||
* [CVE-2023-21929](CVE-2023/CVE-2023-219xx/CVE-2023-21929.json) (`2023-04-27T15:15:10.773`)
|
||||
* [CVE-2023-21930](CVE-2023/CVE-2023-219xx/CVE-2023-21930.json) (`2023-04-27T15:15:10.847`)
|
||||
* [CVE-2023-21933](CVE-2023/CVE-2023-219xx/CVE-2023-21933.json) (`2023-04-27T15:15:10.917`)
|
||||
* [CVE-2023-21935](CVE-2023/CVE-2023-219xx/CVE-2023-21935.json) (`2023-04-27T15:15:10.987`)
|
||||
* [CVE-2023-21937](CVE-2023/CVE-2023-219xx/CVE-2023-21937.json) (`2023-04-27T15:15:11.067`)
|
||||
* [CVE-2023-21938](CVE-2023/CVE-2023-219xx/CVE-2023-21938.json) (`2023-04-27T15:15:11.140`)
|
||||
* [CVE-2023-21939](CVE-2023/CVE-2023-219xx/CVE-2023-21939.json) (`2023-04-27T15:15:11.210`)
|
||||
* [CVE-2023-21940](CVE-2023/CVE-2023-219xx/CVE-2023-21940.json) (`2023-04-27T15:15:11.280`)
|
||||
* [CVE-2023-21945](CVE-2023/CVE-2023-219xx/CVE-2023-21945.json) (`2023-04-27T15:15:11.350`)
|
||||
* [CVE-2023-21946](CVE-2023/CVE-2023-219xx/CVE-2023-21946.json) (`2023-04-27T15:15:11.423`)
|
||||
* [CVE-2023-21947](CVE-2023/CVE-2023-219xx/CVE-2023-21947.json) (`2023-04-27T15:15:11.500`)
|
||||
* [CVE-2023-21953](CVE-2023/CVE-2023-219xx/CVE-2023-21953.json) (`2023-04-27T15:15:11.570`)
|
||||
* [CVE-2023-21954](CVE-2023/CVE-2023-219xx/CVE-2023-21954.json) (`2023-04-27T15:15:11.647`)
|
||||
* [CVE-2023-21955](CVE-2023/CVE-2023-219xx/CVE-2023-21955.json) (`2023-04-27T15:15:11.717`)
|
||||
* [CVE-2023-21962](CVE-2023/CVE-2023-219xx/CVE-2023-21962.json) (`2023-04-27T15:15:11.790`)
|
||||
* [CVE-2023-21963](CVE-2023/CVE-2023-219xx/CVE-2023-21963.json) (`2023-04-27T15:15:11.860`)
|
||||
* [CVE-2023-21966](CVE-2023/CVE-2023-219xx/CVE-2023-21966.json) (`2023-04-27T15:15:11.927`)
|
||||
* [CVE-2023-21967](CVE-2023/CVE-2023-219xx/CVE-2023-21967.json) (`2023-04-27T15:15:11.997`)
|
||||
* [CVE-2023-21968](CVE-2023/CVE-2023-219xx/CVE-2023-21968.json) (`2023-04-27T15:15:12.067`)
|
||||
* [CVE-2023-21971](CVE-2023/CVE-2023-219xx/CVE-2023-21971.json) (`2023-04-27T15:15:12.133`)
|
||||
* [CVE-2023-21972](CVE-2023/CVE-2023-219xx/CVE-2023-21972.json) (`2023-04-27T15:15:12.207`)
|
||||
* [CVE-2023-21976](CVE-2023/CVE-2023-219xx/CVE-2023-21976.json) (`2023-04-27T15:15:12.270`)
|
||||
* [CVE-2023-21977](CVE-2023/CVE-2023-219xx/CVE-2023-21977.json) (`2023-04-27T15:15:12.337`)
|
||||
* [CVE-2023-21980](CVE-2023/CVE-2023-219xx/CVE-2023-21980.json) (`2023-04-27T15:15:12.407`)
|
||||
* [CVE-2023-21982](CVE-2023/CVE-2023-219xx/CVE-2023-21982.json) (`2023-04-27T15:15:12.503`)
|
||||
* [CVE-2023-2340](CVE-2023/CVE-2023-23xx/CVE-2023-2340.json) (`2023-04-27T14:36:08.643`)
|
||||
* [CVE-2023-25504](CVE-2023/CVE-2023-255xx/CVE-2023-25504.json) (`2023-04-27T14:08:39.777`)
|
||||
* [CVE-2023-27475](CVE-2023/CVE-2023-274xx/CVE-2023-27475.json) (`2023-04-27T15:15:12.573`)
|
||||
* [CVE-2023-27705](CVE-2023/CVE-2023-277xx/CVE-2023-27705.json) (`2023-04-27T14:27:37.573`)
|
||||
* [CVE-2023-28466](CVE-2023/CVE-2023-284xx/CVE-2023-28466.json) (`2023-04-27T15:15:12.730`)
|
||||
* [CVE-2023-28772](CVE-2023/CVE-2023-287xx/CVE-2023-28772.json) (`2023-04-27T15:15:12.957`)
|
||||
* [CVE-2023-29255](CVE-2023/CVE-2023-292xx/CVE-2023-29255.json) (`2023-04-27T14:36:08.643`)
|
||||
* [CVE-2023-30444](CVE-2023/CVE-2023-304xx/CVE-2023-30444.json) (`2023-04-27T14:36:08.643`)
|
||||
* [CVE-2018-25032](CVE-2018/CVE-2018-250xx/CVE-2018-25032.json) (`2023-04-27T17:50:02.350`)
|
||||
* [CVE-2022-21426](CVE-2022/CVE-2022-214xx/CVE-2022-21426.json) (`2023-04-27T17:53:04.237`)
|
||||
* [CVE-2022-21434](CVE-2022/CVE-2022-214xx/CVE-2022-21434.json) (`2023-04-27T17:52:30.543`)
|
||||
* [CVE-2022-21443](CVE-2022/CVE-2022-214xx/CVE-2022-21443.json) (`2023-04-27T17:50:39.107`)
|
||||
* [CVE-2022-21449](CVE-2022/CVE-2022-214xx/CVE-2022-21449.json) (`2023-04-27T17:52:20.057`)
|
||||
* [CVE-2022-21476](CVE-2022/CVE-2022-214xx/CVE-2022-21476.json) (`2023-04-27T17:51:31.157`)
|
||||
* [CVE-2022-21496](CVE-2022/CVE-2022-214xx/CVE-2022-21496.json) (`2023-04-27T17:52:00.447`)
|
||||
* [CVE-2022-21540](CVE-2022/CVE-2022-215xx/CVE-2022-21540.json) (`2023-04-27T17:35:22.343`)
|
||||
* [CVE-2022-21541](CVE-2022/CVE-2022-215xx/CVE-2022-21541.json) (`2023-04-27T17:36:38.430`)
|
||||
* [CVE-2022-21549](CVE-2022/CVE-2022-215xx/CVE-2022-21549.json) (`2023-04-27T17:34:01.140`)
|
||||
* [CVE-2022-21618](CVE-2022/CVE-2022-216xx/CVE-2022-21618.json) (`2023-04-27T17:37:47.360`)
|
||||
* [CVE-2022-21619](CVE-2022/CVE-2022-216xx/CVE-2022-21619.json) (`2023-04-27T17:37:27.263`)
|
||||
* [CVE-2022-21624](CVE-2022/CVE-2022-216xx/CVE-2022-21624.json) (`2023-04-27T17:45:14.937`)
|
||||
* [CVE-2022-21626](CVE-2022/CVE-2022-216xx/CVE-2022-21626.json) (`2023-04-27T17:37:07.933`)
|
||||
* [CVE-2022-21628](CVE-2022/CVE-2022-216xx/CVE-2022-21628.json) (`2023-04-27T17:46:04.293`)
|
||||
* [CVE-2022-34169](CVE-2022/CVE-2022-341xx/CVE-2022-34169.json) (`2023-04-27T17:36:52.673`)
|
||||
* [CVE-2022-39399](CVE-2022/CVE-2022-393xx/CVE-2022-39399.json) (`2023-04-27T17:47:44.157`)
|
||||
* [CVE-2023-21830](CVE-2023/CVE-2023-218xx/CVE-2023-21830.json) (`2023-04-27T17:49:17.293`)
|
||||
* [CVE-2023-21835](CVE-2023/CVE-2023-218xx/CVE-2023-21835.json) (`2023-04-27T17:48:26.237`)
|
||||
* [CVE-2023-21843](CVE-2023/CVE-2023-218xx/CVE-2023-21843.json) (`2023-04-27T17:49:30.817`)
|
||||
* [CVE-2023-22307](CVE-2023/CVE-2023-223xx/CVE-2023-22307.json) (`2023-04-27T17:34:42.187`)
|
||||
* [CVE-2023-25555](CVE-2023/CVE-2023-255xx/CVE-2023-25555.json) (`2023-04-27T17:58:26.807`)
|
||||
* [CVE-2023-29855](CVE-2023/CVE-2023-298xx/CVE-2023-29855.json) (`2023-04-27T16:48:18.493`)
|
||||
* [CVE-2023-29887](CVE-2023/CVE-2023-298xx/CVE-2023-29887.json) (`2023-04-27T17:15:31.560`)
|
||||
* [CVE-2023-30539](CVE-2023/CVE-2023-305xx/CVE-2023-30539.json) (`2023-04-27T16:40:57.937`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
@ -120,7 +82,7 @@ There are several ways you can work with the data in this repository:
|
||||
|
||||
### 1) Release Data Feed Packages
|
||||
|
||||
The most straightforward approach is to obtain the latest Data Feed release packages [here](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest).
|
||||
The most straightforward approach is to obtain the latest Data Feed release packages [here](releases/latest).
|
||||
|
||||
Each day at 00:00 AM UTC we package and upload JSON files that aim to reconstruct the legacy NVD CVE Data Feeds.
|
||||
Those are aggregated by the `year` part of the CVE identifier:
|
||||
|
Loading…
x
Reference in New Issue
Block a user