Auto-Update: 2023-04-27T18:00:25.219432+00:00

This commit is contained in:
René Helmke 2023-04-27 20:00:28 +02:00
parent ea7460621c
commit 9b6d722587
33 changed files with 1639 additions and 262 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-25032",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-25T09:15:08.187",
"lastModified": "2023-02-11T17:44:46.857",
"lastModified": "2023-04-27T17:50:02.350",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -691,6 +691,52 @@
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*",
"matchCriteriaId": "850B5359-7804-406B-9DC9-D22D65ACEE40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
"matchCriteriaId": "5522AD81-A23E-47D3-82E4-6D71ECEB1DBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC61C25-871B-4F6F-A5F0-77359F373681"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
"matchCriteriaId": "12A59E25-5ED3-4A6D-95F6-45750866E0D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0DC492-706E-42FE-8757-71873B53C417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21426",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-04-19T21:15:15.157",
"lastModified": "2022-07-28T17:00:28.430",
"lastModified": "2023-04-27T17:53:04.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -252,6 +252,56 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*",
"matchCriteriaId": "850B5359-7804-406B-9DC9-D22D65ACEE40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
"matchCriteriaId": "5522AD81-A23E-47D3-82E4-6D71ECEB1DBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC61C25-871B-4F6F-A5F0-77359F373681"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
"matchCriteriaId": "12A59E25-5ED3-4A6D-95F6-45750866E0D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0DC492-706E-42FE-8757-71873B53C417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:18.28:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD8BF00-C510-4E63-8949-CB64E9043610"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21434",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-04-19T21:15:15.387",
"lastModified": "2022-07-28T17:03:03.207",
"lastModified": "2023-04-27T17:52:30.543",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -252,6 +252,56 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*",
"matchCriteriaId": "850B5359-7804-406B-9DC9-D22D65ACEE40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
"matchCriteriaId": "5522AD81-A23E-47D3-82E4-6D71ECEB1DBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC61C25-871B-4F6F-A5F0-77359F373681"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
"matchCriteriaId": "12A59E25-5ED3-4A6D-95F6-45750866E0D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0DC492-706E-42FE-8757-71873B53C417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:18.28:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD8BF00-C510-4E63-8949-CB64E9043610"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21443",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-04-19T21:15:15.800",
"lastModified": "2022-10-06T02:43:55.687",
"lastModified": "2023-04-27T17:50:39.107",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -252,6 +252,57 @@
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*",
"matchCriteriaId": "850B5359-7804-406B-9DC9-D22D65ACEE40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
"matchCriteriaId": "5522AD81-A23E-47D3-82E4-6D71ECEB1DBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC61C25-871B-4F6F-A5F0-77359F373681"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
"matchCriteriaId": "12A59E25-5ED3-4A6D-95F6-45750866E0D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0DC492-706E-42FE-8757-71873B53C417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:18.28:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD8BF00-C510-4E63-8949-CB64E9043610"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21449",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-04-19T21:15:16.127",
"lastModified": "2022-05-13T12:55:07.697",
"lastModified": "2023-04-27T17:52:20.057",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -220,6 +220,31 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:18.28:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD8BF00-C510-4E63-8949-CB64E9043610"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21476",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-04-19T21:15:17.503",
"lastModified": "2022-10-06T02:58:00.350",
"lastModified": "2023-04-27T17:51:31.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -252,6 +252,47 @@
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
"matchCriteriaId": "5522AD81-A23E-47D3-82E4-6D71ECEB1DBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC61C25-871B-4F6F-A5F0-77359F373681"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
"matchCriteriaId": "12A59E25-5ED3-4A6D-95F6-45750866E0D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0DC492-706E-42FE-8757-71873B53C417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21496",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-04-19T21:15:18.497",
"lastModified": "2022-10-06T03:00:33.120",
"lastModified": "2023-04-27T17:52:00.447",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -262,6 +262,57 @@
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*",
"matchCriteriaId": "850B5359-7804-406B-9DC9-D22D65ACEE40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*",
"matchCriteriaId": "5522AD81-A23E-47D3-82E4-6D71ECEB1DBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC61C25-871B-4F6F-A5F0-77359F373681"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*",
"matchCriteriaId": "12A59E25-5ED3-4A6D-95F6-45750866E0D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0DC492-706E-42FE-8757-71873B53C417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*",
"matchCriteriaId": "C1441FE9-45C5-46C4-BF78-FD5D30F9C80C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*",
"matchCriteriaId": "28D25E37-5479-4876-B46C-28FF87384852"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:18.28:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD8BF00-C510-4E63-8949-CB64E9043610"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21540",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-07-19T22:15:11.730",
"lastModified": "2022-08-22T15:09:00.537",
"lastModified": "2023-04-27T17:35:22.343",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -862,73 +862,43 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:6.49:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB7D337-B3E6-4BCE-8249-0473D2DE08BC"
"criteria": "cpe:2.3:a:azul:zulu:6.47:*:*:*:*:*:*:*",
"matchCriteriaId": "4E4633C4-E552-439D-8FE4-139E3A7956CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.55:*:*:*:*:*:*:*",
"matchCriteriaId": "52AFAB07-AC29-4913-8F98-84A3D665A6FC"
"criteria": "cpe:2.3:a:azul:zulu:7.54:*:*:*:*:*:*:*",
"matchCriteriaId": "50C77346-8893-44F0-B0D1-5D4D30A9CA3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
"criteria": "cpe:2.3:a:azul:zulu:8.62:*:*:*:*:*:*:*",
"matchCriteriaId": "63E58DE0-A96A-452E-986F-3BD2FEA7C723"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.63:*:*:*:*:*:*:*",
"matchCriteriaId": "A989A711-6140-44BE-9BF9-1C09EE6E3B01"
"criteria": "cpe:2.3:a:azul:zulu:11.56:*:*:*:*:*:*:*",
"matchCriteriaId": "D3FB1BF4-3FCF-4007-A9E3-97C35483D6A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
"criteria": "cpe:2.3:a:azul:zulu:13.48:*:*:*:*:*:*:*",
"matchCriteriaId": "BD7A33EC-DE03-424F-9796-E5EA071FF6CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.57:*:*:*:*:*:*:*",
"matchCriteriaId": "71F08EDB-E02B-4FAE-99A5-15EE073F533C"
"criteria": "cpe:2.3:a:azul:zulu:15.40:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDAFFA9-0AA4-4C70-9154-8DA4BB255FD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
"criteria": "cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*",
"matchCriteriaId": "B6302149-28AA-481E-BC6C-87D05E73768A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.49:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6BBD51-8B01-458E-B76B-B2AC933052C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.41:*:*:*:*:*:*:*",
"matchCriteriaId": "50ED6589-FFBD-4D06-92A1-9DAB8C493D46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.35:*:*:*:*:*:*:*",
"matchCriteriaId": "706192CB-91B4-4D31-8715-B6FAAA34C7CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:18.32:*:*:*:*:*:*:*",
"matchCriteriaId": "9E692919-EA06-4C94-8726-5577626A18EF"
"criteria": "cpe:2.3:a:azul:zulu:18.30:*:*:*:*:*:*:*",
"matchCriteriaId": "20DFD9D8-8648-40F7-81B8-04F852A337FA"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21541",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-07-19T22:15:11.783",
"lastModified": "2022-08-22T15:09:40.513",
"lastModified": "2023-04-27T17:36:38.430",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -862,68 +862,38 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.55:*:*:*:*:*:*:*",
"matchCriteriaId": "52AFAB07-AC29-4913-8F98-84A3D665A6FC"
"criteria": "cpe:2.3:a:azul:zulu:7.54:*:*:*:*:*:*:*",
"matchCriteriaId": "50C77346-8893-44F0-B0D1-5D4D30A9CA3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
"criteria": "cpe:2.3:a:azul:zulu:8.62:*:*:*:*:*:*:*",
"matchCriteriaId": "63E58DE0-A96A-452E-986F-3BD2FEA7C723"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.63:*:*:*:*:*:*:*",
"matchCriteriaId": "A989A711-6140-44BE-9BF9-1C09EE6E3B01"
"criteria": "cpe:2.3:a:azul:zulu:11.56:*:*:*:*:*:*:*",
"matchCriteriaId": "D3FB1BF4-3FCF-4007-A9E3-97C35483D6A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
"criteria": "cpe:2.3:a:azul:zulu:13.48:*:*:*:*:*:*:*",
"matchCriteriaId": "BD7A33EC-DE03-424F-9796-E5EA071FF6CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.57:*:*:*:*:*:*:*",
"matchCriteriaId": "71F08EDB-E02B-4FAE-99A5-15EE073F533C"
"criteria": "cpe:2.3:a:azul:zulu:15.40:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDAFFA9-0AA4-4C70-9154-8DA4BB255FD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
"criteria": "cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*",
"matchCriteriaId": "B6302149-28AA-481E-BC6C-87D05E73768A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.49:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6BBD51-8B01-458E-B76B-B2AC933052C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.41:*:*:*:*:*:*:*",
"matchCriteriaId": "50ED6589-FFBD-4D06-92A1-9DAB8C493D46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.35:*:*:*:*:*:*:*",
"matchCriteriaId": "706192CB-91B4-4D31-8715-B6FAAA34C7CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:18.32:*:*:*:*:*:*:*",
"matchCriteriaId": "9E692919-EA06-4C94-8726-5577626A18EF"
"criteria": "cpe:2.3:a:azul:zulu:18.30:*:*:*:*:*:*:*",
"matchCriteriaId": "20DFD9D8-8648-40F7-81B8-04F852A337FA"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21549",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-07-19T22:15:12.147",
"lastModified": "2022-08-22T15:08:41.367",
"lastModified": "2023-04-27T17:34:01.140",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -89,13 +89,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.35:*:*:*:*:*:*:*",
"matchCriteriaId": "706192CB-91B4-4D31-8715-B6FAAA34C7CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
"criteria": "cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*",
"matchCriteriaId": "B6302149-28AA-481E-BC6C-87D05E73768A"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21618",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-10-18T21:15:12.757",
"lastModified": "2022-12-08T15:55:45.877",
"lastModified": "2023-04-27T17:37:47.360",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -167,6 +167,41 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:19.28:*:*:*:*:*:*:*",
"matchCriteriaId": "B394E478-B822-488E-B74B-F46C4DB2B1A5"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21619",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-10-18T21:15:12.810",
"lastModified": "2022-12-08T15:56:01.790",
"lastModified": "2023-04-27T17:37:27.263",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -212,6 +212,51 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:19.28:*:*:*:*:*:*:*",
"matchCriteriaId": "B394E478-B822-488E-B74B-F46C4DB2B1A5"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21624",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-10-18T21:15:13.657",
"lastModified": "2022-12-08T15:56:09.653",
"lastModified": "2023-04-27T17:45:14.937",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -207,6 +207,56 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:6.49:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB7D337-B3E6-4BCE-8249-0473D2DE08BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:19.28:*:*:*:*:*:*:*",
"matchCriteriaId": "B394E478-B822-488E-B74B-F46C4DB2B1A5"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21626",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-10-18T21:15:13.770",
"lastModified": "2022-12-08T15:56:18.160",
"lastModified": "2023-04-27T17:37:07.933",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -187,6 +187,46 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:6.49:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB7D337-B3E6-4BCE-8249-0473D2DE08BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-21628",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-10-18T21:15:13.887",
"lastModified": "2022-12-08T15:56:24.393",
"lastModified": "2023-04-27T17:46:04.293",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -207,6 +207,56 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:6.49:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB7D337-B3E6-4BCE-8249-0473D2DE08BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:19.28:*:*:*:*:*:*:*",
"matchCriteriaId": "B394E478-B822-488E-B74B-F46C4DB2B1A5"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34169",
"sourceIdentifier": "security@apache.org",
"published": "2022-07-19T18:15:11.740",
"lastModified": "2022-11-29T02:07:19.047",
"lastModified": "2023-04-27T17:36:52.673",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -883,73 +883,43 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:6.49:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB7D337-B3E6-4BCE-8249-0473D2DE08BC"
"criteria": "cpe:2.3:a:azul:zulu:6.47:*:*:*:*:*:*:*",
"matchCriteriaId": "4E4633C4-E552-439D-8FE4-139E3A7956CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.55:*:*:*:*:*:*:*",
"matchCriteriaId": "52AFAB07-AC29-4913-8F98-84A3D665A6FC"
"criteria": "cpe:2.3:a:azul:zulu:7.54:*:*:*:*:*:*:*",
"matchCriteriaId": "50C77346-8893-44F0-B0D1-5D4D30A9CA3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.56:*:*:*:*:*:*:*",
"matchCriteriaId": "285FB110-9501-4F23-BC21-B2EE1E1B82BA"
"criteria": "cpe:2.3:a:azul:zulu:8.62:*:*:*:*:*:*:*",
"matchCriteriaId": "63E58DE0-A96A-452E-986F-3BD2FEA7C723"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.63:*:*:*:*:*:*:*",
"matchCriteriaId": "A989A711-6140-44BE-9BF9-1C09EE6E3B01"
"criteria": "cpe:2.3:a:azul:zulu:11.56:*:*:*:*:*:*:*",
"matchCriteriaId": "D3FB1BF4-3FCF-4007-A9E3-97C35483D6A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.64:*:*:*:*:*:*:*",
"matchCriteriaId": "FB77FECF-07E1-448E-86F2-DD78B443D7C0"
"criteria": "cpe:2.3:a:azul:zulu:13.48:*:*:*:*:*:*:*",
"matchCriteriaId": "BD7A33EC-DE03-424F-9796-E5EA071FF6CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.57:*:*:*:*:*:*:*",
"matchCriteriaId": "71F08EDB-E02B-4FAE-99A5-15EE073F533C"
"criteria": "cpe:2.3:a:azul:zulu:15.40:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDAFFA9-0AA4-4C70-9154-8DA4BB255FD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
"criteria": "cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*",
"matchCriteriaId": "B6302149-28AA-481E-BC6C-87D05E73768A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.49:*:*:*:*:*:*:*",
"matchCriteriaId": "9E6BBD51-8B01-458E-B76B-B2AC933052C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.41:*:*:*:*:*:*:*",
"matchCriteriaId": "50ED6589-FFBD-4D06-92A1-9DAB8C493D46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.35:*:*:*:*:*:*:*",
"matchCriteriaId": "706192CB-91B4-4D31-8715-B6FAAA34C7CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:18.32:*:*:*:*:*:*:*",
"matchCriteriaId": "9E692919-EA06-4C94-8726-5577626A18EF"
"criteria": "cpe:2.3:a:azul:zulu:18.30:*:*:*:*:*:*:*",
"matchCriteriaId": "20DFD9D8-8648-40F7-81B8-04F852A337FA"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39399",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2022-10-18T21:15:14.730",
"lastModified": "2022-12-08T15:56:35.367",
"lastModified": "2023-04-27T17:47:44.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -187,6 +187,41 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.58:*:*:*:*:*:*:*",
"matchCriteriaId": "9323C11D-50C6-4356-A2FF-294F750906AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.50:*:*:*:*:*:*:*",
"matchCriteriaId": "DC373919-C38D-4E22-A52D-BA9074E88124"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.42:*:*:*:*:*:*:*",
"matchCriteriaId": "E7832CA7-569F-4C01-991C-F74F24CC2A01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F2878A5A-63FA-4681-8643-D47DA6E9011F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:19.28:*:*:*:*:*:*:*",
"matchCriteriaId": "B394E478-B822-488E-B74B-F46C4DB2B1A5"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-21830",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2023-01-18T00:15:12.873",
"lastModified": "2023-01-24T19:29:45.927",
"lastModified": "2023-04-27T17:49:17.293",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -111,6 +111,31 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:6.51:*:*:*:*:*:*:*",
"matchCriteriaId": "68C21354-003A-4BEC-8641-9BF2BD1D04F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.57:*:*:*:*:*:*:*",
"matchCriteriaId": "08F84DE8-7A9F-444A-A73F-9022C11EDCA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.66:*:*:*:*:*:*:*",
"matchCriteriaId": "D9894F71-FE59-42D8-BD29-7269034328C7"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-21835",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2023-01-18T00:15:13.147",
"lastModified": "2023-01-24T19:29:23.600",
"lastModified": "2023-04-27T17:48:26.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -101,6 +101,41 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.60:*:*:*:*:*:*:*",
"matchCriteriaId": "B47BECB1-5502-490C-8BF1-E4F673802228"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.52:*:*:*:*:*:*:*",
"matchCriteriaId": "7BC1D121-AD8E-41F9-A4EA-26889ADDF0FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.44:*:*:*:*:*:*:*",
"matchCriteriaId": "EDAAB21D-17E7-4FF5-B31C-BFD7EBF6505B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.38:*:*:*:*:*:*:*",
"matchCriteriaId": "04C2FA3F-7CAC-45E2-B2ED-FA6C98884C5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:19.30:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD5B562-AB32-477D-B46D-F3E41A43A809"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-21843",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2023-01-18T00:15:13.717",
"lastModified": "2023-01-24T19:23:25.517",
"lastModified": "2023-04-27T17:49:30.817",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -131,6 +131,56 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:6.51:*:*:*:*:*:*:*",
"matchCriteriaId": "68C21354-003A-4BEC-8641-9BF2BD1D04F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:7.57:*:*:*:*:*:*:*",
"matchCriteriaId": "08F84DE8-7A9F-444A-A73F-9022C11EDCA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:8.66:*:*:*:*:*:*:*",
"matchCriteriaId": "D9894F71-FE59-42D8-BD29-7269034328C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:11.60:*:*:*:*:*:*:*",
"matchCriteriaId": "B47BECB1-5502-490C-8BF1-E4F673802228"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:13.52:*:*:*:*:*:*:*",
"matchCriteriaId": "7BC1D121-AD8E-41F9-A4EA-26889ADDF0FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:15.44:*:*:*:*:*:*:*",
"matchCriteriaId": "EDAAB21D-17E7-4FF5-B31C-BFD7EBF6505B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:17.38:*:*:*:*:*:*:*",
"matchCriteriaId": "04C2FA3F-7CAC-45E2-B2ED-FA6C98884C5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azul:zulu:19.30:*:*:*:*:*:*:*",
"matchCriteriaId": "ECD5B562-AB32-477D-B46D-F3E41A43A809"
}
]
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22307",
"sourceIdentifier": "security@checkmk.com",
"published": "2023-04-18T19:15:07.120",
"lastModified": "2023-04-18T19:40:03.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-04-27T17:34:42.187",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "security@checkmk.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
},
{
"source": "security@checkmk.com",
"type": "Secondary",
@ -50,10 +80,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tribe29:checkmk_appliance_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.6.4",
"matchCriteriaId": "3275F8D1-2252-4524-B04A-9F7D0B23D715"
}
]
}
]
}
],
"references": [
{
"url": "https://checkmk.com/werk/9522",
"source": "security@checkmk.com"
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-2349",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-27T16:15:11.063",
"lastModified": "2023-04-27T16:26:09.020",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in SourceCodester Service Provider Management System 1.0. Affected is an unknown function of the file /admin/index.php. The manipulation of the argument page leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227592."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%204.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.227592",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.227592",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-2350",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-27T16:15:11.207",
"lastModified": "2023-04-27T16:26:09.020",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in SourceCodester Service Provider Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Users.php. The manipulation of the argument id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227593 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%205.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.227593",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.227593",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25555",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2023-04-18T21:15:08.910",
"lastModified": "2023-04-18T21:25:05.953",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-04-27T17:58:26.807",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "cybersecurity@se.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.9.2",
"matchCriteriaId": "9DCD63E5-0A70-47B2-9F4F-5328E0BD04B0"
}
]
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf",
"source": "cybersecurity@se.com"
"source": "cybersecurity@se.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-29855",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-18T18:15:07.547",
"lastModified": "2023-04-18T19:40:03.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-04-27T16:48:18.493",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "WBCE CMS 1.5.3 has a command execution vulnerability via admin/languages/install.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wbce:wbce_cms:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "37C64E93-0C2F-4BB4-BF53-1E7F781D1116"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/WBCE/WBCE_CMS/issues/544",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-29887",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-18T20:15:19.917",
"lastModified": "2023-04-18T20:37:55.127",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-04-27T17:15:31.560",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A Local File inclusion vulnerability in test.php in spreadsheet-reader 0.5.11 allows remote attackers to include arbitrary files via the File parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nuovo:spreadsheet-reader:0.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1A98E674-A1ED-4B77-8A2B-2322423D0852"
}
]
}
]
}
],
"references": [
{
"url": "https://research.hisolutions.com/2023/01/arbitrary-file-read-vulnerability-php-library-nuovo-spreadsheet-reader-0-5-11/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30539",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-17T22:15:10.210",
"lastModified": "2023-04-18T03:15:28.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-04-27T16:40:57.937",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,22 +76,130 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_files_automated_tagging:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.14.0",
"versionEndExcluding": "1.14.2",
"matchCriteriaId": "1C665CB5-94A9-4916-AC88-9C9F9F8A4778"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_files_automated_tagging:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.15.0",
"versionEndExcluding": "1.15.3",
"matchCriteriaId": "376831D6-33D5-431A-BFFB-036784A9D08D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_files_automated_tagging:1.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C83F62E-7C71-4230-9F8E-B79C0AE821A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_files_automated_tagging:1.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6A915FBA-4292-4D7A-9D13-446E95773A9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_files_automated_tagging:1.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD21F977-90E4-4E1D-A5A8-2ABE9D530807"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_files_automated_tagging:1.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BB632467-6671-4E24-ACAA-1CF780340A2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "21.0.0",
"versionEndExcluding": "21.0.9.11",
"matchCriteriaId": "CCFF2EE4-A5E2-4C88-9E4E-F442E567166C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "22.0.0",
"versionEndExcluding": "22.2.10.11",
"matchCriteriaId": "59DDD98F-8315-4CA0-9360-E05B0B790086"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.12.6",
"matchCriteriaId": "CE1029E7-ACE9-4547-A18D-10300912A87B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.11",
"matchCriteriaId": "F826F841-9E60-44B7-81F0-77E552CC2BAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.11",
"matchCriteriaId": "6A5FB4F4-16FC-4B98-897C-4DA109899A28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "25.0.0",
"versionEndExcluding": "25.0.5",
"matchCriteriaId": "8B9FE0C2-3437-42C6-9F9E-84DB8AC4D3B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "25.0.0",
"versionEndExcluding": "25.0.5",
"matchCriteriaId": "88FDB61B-A9D8-4762-B6DD-A6FFF347E0B7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/files_automatedtagging/pull/705",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m2f-v8x7-9w99",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/nextcloud/server/pull/37252",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://hackerone.com/reports/1895976",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-30624",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-27T17:15:08.737",
"lastModified": "2023-04-27T17:15:08.737",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Wasmtime is a standalone runtime for WebAssembly. Prior to versions 6.0.2, 7.0.1, and 8.0.1, Wasmtime's implementation of managing per-instance state, such as tables and memories, contains LLVM-level undefined behavior. This undefined behavior was found to cause runtime-level issues when compiled with LLVM 16 which causes some writes, which are critical for correctness, to be optimized away. Vulnerable versions of Wasmtime compiled with Rust 1.70, which is currently in beta, or later are known to have incorrectly compiled functions. Versions of Wasmtime compiled with the current Rust stable release, 1.69, and prior are not known at this time to have any issues, but can theoretically exhibit potential issues.\n\nThe underlying problem is that Wasmtime's runtime state for an instance involves a Rust-defined structure called `Instance` which has a trailing `VMContext` structure after it. This `VMContext` structure has a runtime-defined layout that is unique per-module. This representation cannot be expressed with safe code in Rust so `unsafe` code is required to maintain this state. The code doing this, however, has methods which take `&self` as an argument but modify data in the `VMContext` part of the allocation. This means that pointers derived from `&self` are mutated. This is typically not allowed, except in the presence of `UnsafeCell`, in Rust. When compiled to LLVM these functions have `noalias readonly` parameters which means it's UB to write through the pointers.\n\nWasmtime's internal representation and management of `VMContext` has been updated to use `&mut self` methods where appropriate. Additionally verification tools for `unsafe` code in Rust, such as `cargo miri`, are planned to be executed on the `main` branch soon to fix any Rust-level issues that may be exploited in future compiler versions.\n\nPrecomplied binaries available for Wasmtime from GitHub releases have been compiled with at most LLVM 15 so are not known to be vulnerable. As mentioned above, however, it's still recommended to update.\n\nWasmtime version 6.0.2, 7.0.1, and 8.0.1 have been issued which contain the patch necessary to work correctly on LLVM 16 and have no known UB on LLVM 15 and earlier. If Wasmtime is compiled with Rust 1.69 and prior, which use LLVM 15, then there are no known issues. There is a theoretical possibility for undefined behavior to exploited, however, so it's recommended that users upgrade to a patched version of Wasmtime. Users using beta Rust (1.70 at this time) or nightly Rust (1.71 at this time) must update to a patched version to work correctly."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 3.9,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.5,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-758"
}
]
}
],
"references": [
{
"url": "https://github.com/bytecodealliance/wasmtime/commit/0977952dcd9d482bff7c288868ccb52769b3a92e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-ch89-5g45-qwc7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-30848",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-27T16:15:11.273",
"lastModified": "2023-04-27T16:26:09.020",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Pimcore is an open source data and experience management platform. Prior to version 10.5.21, the admin search find API has a SQL injection vulnerability. Users should upgrade to version 10.5.21 to receive a patch or, as a workaround, apply the patch manually."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/pimcore/pimcore/commit/25ad8674886f2b938243cbe13e33e204a2e35cc3.patch",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pimcore/pimcore/pull/14972",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-6mhm-gcpf-5gr8",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-30849",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-27T16:15:11.330",
"lastModified": "2023-04-27T16:26:09.020",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Pimcore is an open source data and experience management platform. Prior to version 10.5.21, A SQL injection vulnerability exists in the translation export API. Users should update to version 10.5.21 to receive a patch or, as a workaround, or apply the patch manually."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/pimcore/pimcore/commit/c6c80905e58c7724c776f980570a56df7016c6d1.patch",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pimcore/pimcore/pull/14968",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-xmg8-w465-mr56",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-30850",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-27T17:15:08.880",
"lastModified": "2023-04-27T17:15:08.880",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Pimcore is an open source data and experience management platform. Prior to version 10.5.21, a SQL Injection vulnerability exists in the admin translations API. Users should update to version 10.5.21 to receive a patch or, as a workaround, or apply the patch manually."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/pimcore/pimcore/commit/7e32cc28145274ddfc30fb791012d26c1278bd38.patch",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pimcore/pimcore/pull/14952",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-jwg4-qcgv-5wg6",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-30852",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-27T17:15:08.957",
"lastModified": "2023-04-27T17:15:08.957",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Pimcore is an open source data and experience management platform. Prior to version 10.5.21, the `/admin/misc/script-proxy` API endpoint that is accessible by an authenticated administrator user is vulnerable to arbitrary JavaScript and CSS file read via the `scriptPath` and `scripts` parameters. The `scriptPath` parameter is not sanitized properly and is vulnerable to path traversal attack. Any JavaScript/CSS file from the application server can be read by specifying sufficient number of `../` patterns to go out from the application webroot followed by path of the folder where the file is located in the \"scriptPath\" parameter and the file name in the \"scripts\" parameter. The JavaScript file is successfully read only if the web application has read access to it. Users should update to version 10.5.21 to receive a patch or, as a workaround, apply the patch manual."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/pimcore/pimcore/commit/498cadec2292f7842fb10612068ac78496e884b4.patch",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pimcore/pimcore/pull/14959",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-j5c3-r84f-9596",
"source": "security-advisories@github.com"
}
]
}

118
README.md
View File

@ -1,7 +1,7 @@
# nvd-json-data-feeds
Community reconstruction of the soon-to-be deprecated JSON NVD Data Feeds.
[Releases](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) each day at 00:00 AM UTC.
[Releases](releases/latest) each day at 00:00 AM UTC.
Repository synchronizes with the NVD every 2 hours.
## Repository at a Glance
@ -9,18 +9,18 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-04-27T16:00:23.761077+00:00
2023-04-27T18:00:25.219432+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-04-27T15:58:36.043000+00:00
2023-04-27T17:58:26.807000+00:00
```
### Last Data Feed Release
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
Download and Changelog: [Click](releases/latest)
```plain
2023-04-27T00:00:20.965588+00:00
@ -29,89 +29,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
213678
213685
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `7`
* [CVE-2023-2341](CVE-2023/CVE-2023-23xx/CVE-2023-2341.json) (`2023-04-27T14:15:09.083`)
* [CVE-2023-2342](CVE-2023/CVE-2023-23xx/CVE-2023-2342.json) (`2023-04-27T14:15:09.137`)
* [CVE-2023-2343](CVE-2023/CVE-2023-23xx/CVE-2023-2343.json) (`2023-04-27T14:15:09.187`)
* [CVE-2023-2344](CVE-2023/CVE-2023-23xx/CVE-2023-2344.json) (`2023-04-27T14:15:09.240`)
* [CVE-2023-2345](CVE-2023/CVE-2023-23xx/CVE-2023-2345.json) (`2023-04-27T15:15:13.187`)
* [CVE-2023-2346](CVE-2023/CVE-2023-23xx/CVE-2023-2346.json) (`2023-04-27T15:15:13.400`)
* [CVE-2023-2347](CVE-2023/CVE-2023-23xx/CVE-2023-2347.json) (`2023-04-27T15:15:13.617`)
* [CVE-2023-2348](CVE-2023/CVE-2023-23xx/CVE-2023-2348.json) (`2023-04-27T15:15:13.723`)
* [CVE-2023-24966](CVE-2023/CVE-2023-249xx/CVE-2023-24966.json) (`2023-04-27T14:15:09.013`)
* [CVE-2023-30338](CVE-2023/CVE-2023-303xx/CVE-2023-30338.json) (`2023-04-27T15:15:13.787`)
* [CVE-2023-30349](CVE-2023/CVE-2023-303xx/CVE-2023-30349.json) (`2023-04-27T14:15:09.320`)
* [CVE-2023-30847](CVE-2023/CVE-2023-308xx/CVE-2023-30847.json) (`2023-04-27T15:15:13.833`)
* [CVE-2023-2349](CVE-2023/CVE-2023-23xx/CVE-2023-2349.json) (`2023-04-27T16:15:11.063`)
* [CVE-2023-2350](CVE-2023/CVE-2023-23xx/CVE-2023-2350.json) (`2023-04-27T16:15:11.207`)
* [CVE-2023-30624](CVE-2023/CVE-2023-306xx/CVE-2023-30624.json) (`2023-04-27T17:15:08.737`)
* [CVE-2023-30848](CVE-2023/CVE-2023-308xx/CVE-2023-30848.json) (`2023-04-27T16:15:11.273`)
* [CVE-2023-30849](CVE-2023/CVE-2023-308xx/CVE-2023-30849.json) (`2023-04-27T16:15:11.330`)
* [CVE-2023-30850](CVE-2023/CVE-2023-308xx/CVE-2023-30850.json) (`2023-04-27T17:15:08.880`)
* [CVE-2023-30852](CVE-2023/CVE-2023-308xx/CVE-2023-30852.json) (`2023-04-27T17:15:08.957`)
### CVEs modified in the last Commit
Recently modified CVEs: `58`
Recently modified CVEs: `25`
* [CVE-2019-13263](CVE-2019/CVE-2019-132xx/CVE-2019-13263.json) (`2023-04-27T14:29:10.147`)
* [CVE-2019-13264](CVE-2019/CVE-2019-132xx/CVE-2019-13264.json) (`2023-04-27T14:29:21.177`)
* [CVE-2019-13265](CVE-2019/CVE-2019-132xx/CVE-2019-13265.json) (`2023-04-27T14:30:15.520`)
* [CVE-2019-9122](CVE-2019/CVE-2019-91xx/CVE-2019-9122.json) (`2023-04-27T14:30:48.700`)
* [CVE-2020-29557](CVE-2020/CVE-2020-295xx/CVE-2020-29557.json) (`2023-04-27T14:31:11.407`)
* [CVE-2021-39537](CVE-2021/CVE-2021-395xx/CVE-2021-39537.json) (`2023-04-27T15:15:09.233`)
* [CVE-2021-40506](CVE-2021/CVE-2021-405xx/CVE-2021-40506.json) (`2023-04-27T15:41:16.207`)
* [CVE-2021-40507](CVE-2021/CVE-2021-405xx/CVE-2021-40507.json) (`2023-04-27T15:41:19.827`)
* [CVE-2022-0812](CVE-2022/CVE-2022-08xx/CVE-2022-0812.json) (`2023-04-27T15:15:09.357`)
* [CVE-2022-37434](CVE-2022/CVE-2022-374xx/CVE-2022-37434.json) (`2023-04-27T15:15:09.470`)
* [CVE-2022-41862](CVE-2022/CVE-2022-418xx/CVE-2022-41862.json) (`2023-04-27T15:15:09.667`)
* [CVE-2022-43548](CVE-2022/CVE-2022-435xx/CVE-2022-43548.json) (`2023-04-27T15:15:09.797`)
* [CVE-2022-43551](CVE-2022/CVE-2022-435xx/CVE-2022-43551.json) (`2023-04-27T15:15:09.903`)
* [CVE-2022-46640](CVE-2022/CVE-2022-466xx/CVE-2022-46640.json) (`2023-04-27T15:54:56.623`)
* [CVE-2023-0215](CVE-2023/CVE-2023-02xx/CVE-2023-0215.json) (`2023-04-27T15:15:09.993`)
* [CVE-2023-0482](CVE-2023/CVE-2023-04xx/CVE-2023-0482.json) (`2023-04-27T15:15:10.077`)
* [CVE-2023-1281](CVE-2023/CVE-2023-12xx/CVE-2023-1281.json) (`2023-04-27T15:15:10.157`)
* [CVE-2023-2150](CVE-2023/CVE-2023-21xx/CVE-2023-2150.json) (`2023-04-27T14:48:37.427`)
* [CVE-2023-2151](CVE-2023/CVE-2023-21xx/CVE-2023-2151.json) (`2023-04-27T14:54:32.557`)
* [CVE-2023-21911](CVE-2023/CVE-2023-219xx/CVE-2023-21911.json) (`2023-04-27T15:15:10.263`)
* [CVE-2023-21912](CVE-2023/CVE-2023-219xx/CVE-2023-21912.json) (`2023-04-27T15:15:10.400`)
* [CVE-2023-21913](CVE-2023/CVE-2023-219xx/CVE-2023-21913.json) (`2023-04-27T15:15:10.487`)
* [CVE-2023-21917](CVE-2023/CVE-2023-219xx/CVE-2023-21917.json) (`2023-04-27T15:15:10.560`)
* [CVE-2023-21919](CVE-2023/CVE-2023-219xx/CVE-2023-21919.json) (`2023-04-27T15:15:10.633`)
* [CVE-2023-21920](CVE-2023/CVE-2023-219xx/CVE-2023-21920.json) (`2023-04-27T15:15:10.703`)
* [CVE-2023-21929](CVE-2023/CVE-2023-219xx/CVE-2023-21929.json) (`2023-04-27T15:15:10.773`)
* [CVE-2023-21930](CVE-2023/CVE-2023-219xx/CVE-2023-21930.json) (`2023-04-27T15:15:10.847`)
* [CVE-2023-21933](CVE-2023/CVE-2023-219xx/CVE-2023-21933.json) (`2023-04-27T15:15:10.917`)
* [CVE-2023-21935](CVE-2023/CVE-2023-219xx/CVE-2023-21935.json) (`2023-04-27T15:15:10.987`)
* [CVE-2023-21937](CVE-2023/CVE-2023-219xx/CVE-2023-21937.json) (`2023-04-27T15:15:11.067`)
* [CVE-2023-21938](CVE-2023/CVE-2023-219xx/CVE-2023-21938.json) (`2023-04-27T15:15:11.140`)
* [CVE-2023-21939](CVE-2023/CVE-2023-219xx/CVE-2023-21939.json) (`2023-04-27T15:15:11.210`)
* [CVE-2023-21940](CVE-2023/CVE-2023-219xx/CVE-2023-21940.json) (`2023-04-27T15:15:11.280`)
* [CVE-2023-21945](CVE-2023/CVE-2023-219xx/CVE-2023-21945.json) (`2023-04-27T15:15:11.350`)
* [CVE-2023-21946](CVE-2023/CVE-2023-219xx/CVE-2023-21946.json) (`2023-04-27T15:15:11.423`)
* [CVE-2023-21947](CVE-2023/CVE-2023-219xx/CVE-2023-21947.json) (`2023-04-27T15:15:11.500`)
* [CVE-2023-21953](CVE-2023/CVE-2023-219xx/CVE-2023-21953.json) (`2023-04-27T15:15:11.570`)
* [CVE-2023-21954](CVE-2023/CVE-2023-219xx/CVE-2023-21954.json) (`2023-04-27T15:15:11.647`)
* [CVE-2023-21955](CVE-2023/CVE-2023-219xx/CVE-2023-21955.json) (`2023-04-27T15:15:11.717`)
* [CVE-2023-21962](CVE-2023/CVE-2023-219xx/CVE-2023-21962.json) (`2023-04-27T15:15:11.790`)
* [CVE-2023-21963](CVE-2023/CVE-2023-219xx/CVE-2023-21963.json) (`2023-04-27T15:15:11.860`)
* [CVE-2023-21966](CVE-2023/CVE-2023-219xx/CVE-2023-21966.json) (`2023-04-27T15:15:11.927`)
* [CVE-2023-21967](CVE-2023/CVE-2023-219xx/CVE-2023-21967.json) (`2023-04-27T15:15:11.997`)
* [CVE-2023-21968](CVE-2023/CVE-2023-219xx/CVE-2023-21968.json) (`2023-04-27T15:15:12.067`)
* [CVE-2023-21971](CVE-2023/CVE-2023-219xx/CVE-2023-21971.json) (`2023-04-27T15:15:12.133`)
* [CVE-2023-21972](CVE-2023/CVE-2023-219xx/CVE-2023-21972.json) (`2023-04-27T15:15:12.207`)
* [CVE-2023-21976](CVE-2023/CVE-2023-219xx/CVE-2023-21976.json) (`2023-04-27T15:15:12.270`)
* [CVE-2023-21977](CVE-2023/CVE-2023-219xx/CVE-2023-21977.json) (`2023-04-27T15:15:12.337`)
* [CVE-2023-21980](CVE-2023/CVE-2023-219xx/CVE-2023-21980.json) (`2023-04-27T15:15:12.407`)
* [CVE-2023-21982](CVE-2023/CVE-2023-219xx/CVE-2023-21982.json) (`2023-04-27T15:15:12.503`)
* [CVE-2023-2340](CVE-2023/CVE-2023-23xx/CVE-2023-2340.json) (`2023-04-27T14:36:08.643`)
* [CVE-2023-25504](CVE-2023/CVE-2023-255xx/CVE-2023-25504.json) (`2023-04-27T14:08:39.777`)
* [CVE-2023-27475](CVE-2023/CVE-2023-274xx/CVE-2023-27475.json) (`2023-04-27T15:15:12.573`)
* [CVE-2023-27705](CVE-2023/CVE-2023-277xx/CVE-2023-27705.json) (`2023-04-27T14:27:37.573`)
* [CVE-2023-28466](CVE-2023/CVE-2023-284xx/CVE-2023-28466.json) (`2023-04-27T15:15:12.730`)
* [CVE-2023-28772](CVE-2023/CVE-2023-287xx/CVE-2023-28772.json) (`2023-04-27T15:15:12.957`)
* [CVE-2023-29255](CVE-2023/CVE-2023-292xx/CVE-2023-29255.json) (`2023-04-27T14:36:08.643`)
* [CVE-2023-30444](CVE-2023/CVE-2023-304xx/CVE-2023-30444.json) (`2023-04-27T14:36:08.643`)
* [CVE-2018-25032](CVE-2018/CVE-2018-250xx/CVE-2018-25032.json) (`2023-04-27T17:50:02.350`)
* [CVE-2022-21426](CVE-2022/CVE-2022-214xx/CVE-2022-21426.json) (`2023-04-27T17:53:04.237`)
* [CVE-2022-21434](CVE-2022/CVE-2022-214xx/CVE-2022-21434.json) (`2023-04-27T17:52:30.543`)
* [CVE-2022-21443](CVE-2022/CVE-2022-214xx/CVE-2022-21443.json) (`2023-04-27T17:50:39.107`)
* [CVE-2022-21449](CVE-2022/CVE-2022-214xx/CVE-2022-21449.json) (`2023-04-27T17:52:20.057`)
* [CVE-2022-21476](CVE-2022/CVE-2022-214xx/CVE-2022-21476.json) (`2023-04-27T17:51:31.157`)
* [CVE-2022-21496](CVE-2022/CVE-2022-214xx/CVE-2022-21496.json) (`2023-04-27T17:52:00.447`)
* [CVE-2022-21540](CVE-2022/CVE-2022-215xx/CVE-2022-21540.json) (`2023-04-27T17:35:22.343`)
* [CVE-2022-21541](CVE-2022/CVE-2022-215xx/CVE-2022-21541.json) (`2023-04-27T17:36:38.430`)
* [CVE-2022-21549](CVE-2022/CVE-2022-215xx/CVE-2022-21549.json) (`2023-04-27T17:34:01.140`)
* [CVE-2022-21618](CVE-2022/CVE-2022-216xx/CVE-2022-21618.json) (`2023-04-27T17:37:47.360`)
* [CVE-2022-21619](CVE-2022/CVE-2022-216xx/CVE-2022-21619.json) (`2023-04-27T17:37:27.263`)
* [CVE-2022-21624](CVE-2022/CVE-2022-216xx/CVE-2022-21624.json) (`2023-04-27T17:45:14.937`)
* [CVE-2022-21626](CVE-2022/CVE-2022-216xx/CVE-2022-21626.json) (`2023-04-27T17:37:07.933`)
* [CVE-2022-21628](CVE-2022/CVE-2022-216xx/CVE-2022-21628.json) (`2023-04-27T17:46:04.293`)
* [CVE-2022-34169](CVE-2022/CVE-2022-341xx/CVE-2022-34169.json) (`2023-04-27T17:36:52.673`)
* [CVE-2022-39399](CVE-2022/CVE-2022-393xx/CVE-2022-39399.json) (`2023-04-27T17:47:44.157`)
* [CVE-2023-21830](CVE-2023/CVE-2023-218xx/CVE-2023-21830.json) (`2023-04-27T17:49:17.293`)
* [CVE-2023-21835](CVE-2023/CVE-2023-218xx/CVE-2023-21835.json) (`2023-04-27T17:48:26.237`)
* [CVE-2023-21843](CVE-2023/CVE-2023-218xx/CVE-2023-21843.json) (`2023-04-27T17:49:30.817`)
* [CVE-2023-22307](CVE-2023/CVE-2023-223xx/CVE-2023-22307.json) (`2023-04-27T17:34:42.187`)
* [CVE-2023-25555](CVE-2023/CVE-2023-255xx/CVE-2023-25555.json) (`2023-04-27T17:58:26.807`)
* [CVE-2023-29855](CVE-2023/CVE-2023-298xx/CVE-2023-29855.json) (`2023-04-27T16:48:18.493`)
* [CVE-2023-29887](CVE-2023/CVE-2023-298xx/CVE-2023-29887.json) (`2023-04-27T17:15:31.560`)
* [CVE-2023-30539](CVE-2023/CVE-2023-305xx/CVE-2023-30539.json) (`2023-04-27T16:40:57.937`)
## Download and Usage
@ -120,7 +82,7 @@ There are several ways you can work with the data in this repository:
### 1) Release Data Feed Packages
The most straightforward approach is to obtain the latest Data Feed release packages [here](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest).
The most straightforward approach is to obtain the latest Data Feed release packages [here](releases/latest).
Each day at 00:00 AM UTC we package and upload JSON files that aim to reconstruct the legacy NVD CVE Data Feeds.
Those are aggregated by the `year` part of the CVE identifier: