mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 10:42:17 +00:00
Auto-Update: 2023-07-05T16:00:27.379389+00:00
This commit is contained in:
parent
6c6a18a0eb
commit
9c9c28a43d
@ -2,19 +2,79 @@
|
||||
"id": "CVE-2020-20210",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-26T18:15:09.407",
|
||||
"lastModified": "2023-06-26T22:13:28.460",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-05T15:15:54.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Bludit 3.9.2 is vulnerable to Remote Code Execution (RCE) via /admin/ajax/upload-images."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Bludit versi\u00f3n 3.9.2 es vulnerable a ejecuci\u00f3n de c\u00f3digo remoto (RCE) a trav\u00e9s de \"/admin/ajax/upload-images\"."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bludit:bludit:3.9.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10A81FA4-0E1B-4680-A04F-E4D2267A98E2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/bludit/bludit/issues/1079",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-25883",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-06-21T05:15:09.060",
|
||||
"lastModified": "2023-06-21T12:29:48.917",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-05T15:49:56.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "report@snyk.io",
|
||||
"type": "Secondary",
|
||||
@ -34,30 +54,81 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:npmjs:semver:*:*:*:*:*:node.js:*:*",
|
||||
"versionEndExcluding": "7.5.2",
|
||||
"matchCriteriaId": "0567A5E5-9098-41E3-AB28-569127D89FA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L138",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L160",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/npm/node-semver/pull/564",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-4488",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-13T15:15:17.207",
|
||||
"lastModified": "2023-02-23T04:46:26.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-05T14:15:09.310",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Widgets on Pages WordPress plugin through 1.6.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins."
|
||||
"value": "The Widgets on Pages WordPress plugin before 1.8.0 does not validate and escape its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,19 +2,444 @@
|
||||
"id": "CVE-2023-25003",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2023-06-23T19:15:08.983",
|
||||
"lastModified": "2023-06-23T19:24:31.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-05T14:10:42.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted pskernel.dll file in Autodesk AutoCAD 2023 and Maya 2022 may be used to trigger out-of-bound read write / read vulnerabilities. Exploitation of this vulnerability may lead to code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:alias:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.1.1",
|
||||
"matchCriteriaId": "19760052-9480-46D8-B5A3-7F6FE3F74ED6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2020",
|
||||
"versionEndExcluding": "2020.1.6",
|
||||
"matchCriteriaId": "5269098B-1C20-4754-99F9-0A6B97E1490D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.1.3",
|
||||
"matchCriteriaId": "00EACCCC-CD89-490B-BBC1-F06EA6867AFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.1.3",
|
||||
"matchCriteriaId": "5829F52D-F61C-4B79-B724-3388B1B1723A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.1.1",
|
||||
"matchCriteriaId": "70C48E66-DF91-4F0B-B93D-F6372BFC55C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2020",
|
||||
"versionEndExcluding": "2020.1.6",
|
||||
"matchCriteriaId": "B85E0DDB-60A9-4AEA-BAA3-34E8DF25BF96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.1.3",
|
||||
"matchCriteriaId": "179FB815-E469-42A1-91CB-B766891C7552"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.1.3",
|
||||
"matchCriteriaId": "CCB04040-8C83-4381-B762-61F0ED8C8CC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.1.1",
|
||||
"matchCriteriaId": "57C7CD03-53D7-4224-82AE-F7CD929E3F92"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2020",
|
||||
"versionEndExcluding": "2020.1.6",
|
||||
"matchCriteriaId": "05FD0056-F524-4475-BB41-0A4CC6E7A3EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.1.3",
|
||||
"matchCriteriaId": "ADE81778-A65F-4A23-BDAC-AC28434E0887"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.1.3",
|
||||
"matchCriteriaId": "D042F7CF-2694-437E-B60A-4C324EBAB1F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.1.1",
|
||||
"matchCriteriaId": "DF68C32D-7015-4513-BEB2-2CFD08DC799B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2020",
|
||||
"versionEndExcluding": "2020.1.6",
|
||||
"matchCriteriaId": "C5FC936E-91AC-4810-9A34-7384096A4922"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.1.3",
|
||||
"matchCriteriaId": "D284FACA-DB0C-4182-96B7-F46EE28B0C54"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.1.3",
|
||||
"matchCriteriaId": "5A628855-3BE7-4B40-AFB7-7819CBD88D21"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.1.1",
|
||||
"matchCriteriaId": "A42B62B9-0ABA-4BE8-9115-6E633664FCE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2020",
|
||||
"versionEndExcluding": "2020.1.6",
|
||||
"matchCriteriaId": "6A46B444-4436-4101-ABF8-DCF3F4E75D18"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.1.3",
|
||||
"matchCriteriaId": "E8994887-8E6A-4F6D-8A52-AB676E251B9F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.1.3",
|
||||
"matchCriteriaId": "731F5891-D398-49AE-BA04-179D9FD18ED2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.1.1",
|
||||
"matchCriteriaId": "E009D956-E27B-435B-A308-9279A7DA2087"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2020",
|
||||
"versionEndExcluding": "2020.1.6",
|
||||
"matchCriteriaId": "07A37B8B-7345-463B-A074-D8C2F242A311"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.1.3",
|
||||
"matchCriteriaId": "85F1017C-4552-4A97-B911-8785EF5DC9A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.1.3",
|
||||
"matchCriteriaId": "0982CCA5-8834-43D7-8596-F330D7A0A52B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.1.1",
|
||||
"matchCriteriaId": "B937A033-FDA2-461E-8697-2341A9DE23DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2020",
|
||||
"versionEndExcluding": "2020.1.6",
|
||||
"matchCriteriaId": "A971D35C-8570-48E2-A6A6-0B2B5966BA56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.1.3",
|
||||
"matchCriteriaId": "4C0FA7D7-85D0-4E32-950E-1DE6D0C4342C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.1.3",
|
||||
"matchCriteriaId": "6FABCBE5-BF7B-4D2E-A886-8D38B3B82872"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.1.1",
|
||||
"matchCriteriaId": "19A43BB0-22A6-4715-B556-1DE7CDCAF616"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2020",
|
||||
"versionEndExcluding": "2020.1.6",
|
||||
"matchCriteriaId": "CF5BB84E-2F7B-4CC5-81F2-884562C1A18A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.1.3",
|
||||
"matchCriteriaId": "3E60EF97-0AA1-480F-B03E-26709C58030F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.1.3",
|
||||
"matchCriteriaId": "EC2B3E51-4AAD-4A1E-951D-6428A0C8D6BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.1.1",
|
||||
"matchCriteriaId": "DE681603-E303-4759-B301-37BACF233C76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2020",
|
||||
"versionEndExcluding": "2020.1.6",
|
||||
"matchCriteriaId": "29A021AB-AFB3-473C-8111-AB0C9D10C805"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.1.3",
|
||||
"matchCriteriaId": "48F4A0E1-8004-40DF-8700-35B6BE99F3C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.1.3",
|
||||
"matchCriteriaId": "D1456E3E-3B38-42E2-96FE-B14361E30CB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.1.1",
|
||||
"matchCriteriaId": "E9601144-D1E1-4F8A-A6C0-447E17F14337"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2020",
|
||||
"versionEndExcluding": "2020.1.6",
|
||||
"matchCriteriaId": "2AA1C57D-9B7E-438B-AD71-784F29B8A185"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.1.3",
|
||||
"matchCriteriaId": "21BE9909-DAA0-4A7C-8AAA-42A984FA0AF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.1.3",
|
||||
"matchCriteriaId": "74942A53-8D7E-4706-B9C3-EB1C03488684"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.1.1",
|
||||
"matchCriteriaId": "4B95D329-E683-4128-8FC4-300CA974F1F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.2",
|
||||
"matchCriteriaId": "FE68AFE1-0F44-4B37-87E5-C7D658186425"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.1",
|
||||
"matchCriteriaId": "089B7B95-60DC-44AD-A3A8-0F4844CEFB22"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.1",
|
||||
"matchCriteriaId": "1F89B484-5A9E-4C22-A9F7-976EF556C08A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.5",
|
||||
"matchCriteriaId": "DB97A508-D0AC-47D2-8CA3-156063FFC136"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.4",
|
||||
"matchCriteriaId": "D35916C1-A782-42AC-B4D4-4131D8F430C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.3.1",
|
||||
"matchCriteriaId": "7A104E6A-8018-4F7F-ADBB-C1F3B29E4F8A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:maya_usd:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.5",
|
||||
"matchCriteriaId": "8389D668-78CB-4CF9-85E0-E37A10D35698"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:maya_usd:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.3",
|
||||
"matchCriteriaId": "35B34667-2549-4EEE-B4F6-930DF7A7A8EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022",
|
||||
"versionEndExcluding": "2022.4",
|
||||
"matchCriteriaId": "BB7E7583-0389-4959-B08E-BA433A32A84C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.2",
|
||||
"matchCriteriaId": "E32A04AB-5C19-4328-9240-5A030E904726"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021",
|
||||
"versionEndExcluding": "2021.1.8",
|
||||
"matchCriteriaId": "3392ACCC-079C-4AF8-A0A8-408711C9D094"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:autodesk:vred:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023",
|
||||
"versionEndExcluding": "2023.4",
|
||||
"matchCriteriaId": "CDF50B0E-69C5-4AD9-8C85-E695834E51BE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0009",
|
||||
"source": "psirt@autodesk.com"
|
||||
"source": "psirt@autodesk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25186",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-16T19:15:14.423",
|
||||
"lastModified": "2023-06-17T02:32:29.473",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-05T15:48:07.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.8,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -34,14 +54,81 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:19b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE8E3A0E-3B21-49D8-A4EE-33FE5FBA7B51"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:20a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A612E565-7686-4C20-99AF-67B283328A42"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:20b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5AE52024-F5EE-42F6-AC3A-702E87B1ABF2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:20c:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA68A71E-A8FB-4448-BE75-318E4582FC43"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:21a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2FAA373-A46D-48A6-8A08-F66F4F3604C7"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nokia:asika_airscale:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61C0B724-C7EA-4214-98CF-49812292332B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://Nokia.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25186/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26115",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-06-22T05:15:09.157",
|
||||
"lastModified": "2023-06-22T12:51:30.407",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-05T15:53:31.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "report@snyk.io",
|
||||
"type": "Secondary",
|
||||
@ -34,18 +54,58 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:word-wrap_project:word-wrap:*:*:*:*:*:node.js:*:*",
|
||||
"matchCriteriaId": "04B48B0A-8B67-4838-A1E0-EB3CB727A813"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jonschlinkert/word-wrap/blob/master/index.js%23L39",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,85 @@
|
||||
"id": "CVE-2023-30258",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-23T12:15:09.473",
|
||||
"lastModified": "2023-06-23T13:03:18.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-05T15:51:17.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:magnussolution:magnusbilling:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.0",
|
||||
"versionEndIncluding": "7.3.0",
|
||||
"matchCriteriaId": "5431D799-492A-4081-9BAB-9CA1C25A3A3C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://eldstal.se/advisories/230327-magnusbilling.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/magnussolution/magnusbilling7/commit/ccff9f6370f530cc41ef7de2e31d7590a0fdb8c3",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3132",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-27T03:15:09.913",
|
||||
"lastModified": "2023-06-27T16:15:38.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-05T15:27:20.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -17,8 +17,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
@ -40,8 +60,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,14 +80,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mainwp:mainwp_child:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.4.1.1",
|
||||
"matchCriteriaId": "8D02314E-0463-4C00-B1B9-3D5DC7E7AF33"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2923512%40mainwp-child&new=2923512%40mainwp-child&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a1fadba1-674f-4f3d-997f-d29d3a887414?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32229",
|
||||
"sourceIdentifier": "psirt@bosch.com",
|
||||
"published": "2023-06-15T11:15:09.347",
|
||||
"lastModified": "2023-06-15T12:39:17.910",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-05T15:31:03.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@bosch.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@bosch.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,137 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:bosch:cpp13_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.48.0017",
|
||||
"matchCriteriaId": "AD4868B9-C8F0-4D7F-A1E7-779380F3A866"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:autodome_7000i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E8ABA51A-F226-4BFB-8871-98943BF36B32"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:autodome_7100_ir:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB793E28-199E-4F3C-9361-C68741F4F3E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:autodome_inteox_7000i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "601B9B20-0A4F-4732-A72A-7D162EBDA624"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:dinion_inteox_7100i_ir:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "160F398A-9464-4BC6-9845-04B8C8780C07"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:flexidome_inteox_7100i_ir:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41995790-0676-4E0F-B5EF-DED421D7702E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:mic_inteox_7100i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "01E87B20-A885-483E-AEBB-445A45BBFC5C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:bosch:cpp14_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.50",
|
||||
"versionEndExcluding": "8.80.0090",
|
||||
"matchCriteriaId": "63996E8C-448D-44B7-8B4B-D1F881C48497"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:dinion_7100i_ir:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4CCB0F1-42BE-4314-B30D-19635D6D276A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:flexidome_indoor_5100i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBA7AD4-9004-45E6-BEC1-4299A5BFD661"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:flexidome_indoor_5100i_ir:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC9FEC11-38CD-4945-83CD-B8A018EB3DA1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:flexidome_multi_7000i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4C7B6F8-7555-4D14-9DDB-299A009089B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:flexidome_multi_7000i_ir:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6EB8EFD-FBA5-4D03-877C-B3D20BAAD9D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:flexidome_outdoor_5100i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0EDBA29C-0C42-4326-AE2D-7597D5EA3232"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:flexidome_outdoor_5100i_ir:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3618E7E0-DFC3-40D2-B1DF-85718D9596E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:flexidome_panoramic_5100i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B1B75764-3CE3-40F1-A34C-23C938BE0C9D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:bosch:flexidome_panoramic_5100i_ir:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "112CA854-16FB-4430-9F02-BC2CD90E9696"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-435698-BT.html",
|
||||
"source": "psirt@bosch.com"
|
||||
"source": "psirt@bosch.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,85 @@
|
||||
"id": "CVE-2023-33725",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-21T16:15:11.413",
|
||||
"lastModified": "2023-06-21T18:57:48.280",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-05T15:52:44.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadleaf 5.x and 6.x (including 5.2.25-GA and 6.2.6-GA) was discovered to contain a cross-site scripting (XSS) vulnerability via a customer signup with a crafted email address. This is fixed in 6.2.6.1-GA."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:broadleafcommerce:broadleaf_commerce:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0",
|
||||
"versionEndIncluding": "5.2.25-ga",
|
||||
"matchCriteriaId": "99269270-23EE-49A1-932A-D639D0353698"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:broadleafcommerce:broadleaf_commerce:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0",
|
||||
"versionEndExcluding": "6.2.6.1-ga",
|
||||
"matchCriteriaId": "277130E0-4FBB-4D44-A5A8-C04F8E98B138"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Contrast-Security-OSS/Burptrast/tree/main/docs/CVE-2023-33725",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,49 @@
|
||||
"id": "CVE-2023-3317",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-23T18:15:14.047",
|
||||
"lastModified": "2023-06-23T19:24:31.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-05T14:39:38.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free flaw was found in mt7921_check_offload_capability in drivers/net/wireless/mediatek/mt76/mt7921/init.c in wifi mt76/mt7921 sub-component in the Linux Kernel. This flaw could allow an attacker to crash the system after 'features' memory release. This vulnerability could even lead to a kernel information leak problem."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
@ -23,10 +56,61 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.3",
|
||||
"matchCriteriaId": "3769AA63-B0A8-4EF1-96F9-6A6A6B305A02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21D6F467-B848-453E-B1A4-BEF940E413A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8E3B0E8-FA27-4305-87BB-AF6C25B160CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A47F0FC3-CE52-4BA1-BA51-22F783938431"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3583026A-27EC-4A4C-850A-83F2AF970673"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC271202-7570-4505-89A4-D602D47BFD00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D413BB6D-4F74-4C7D-9163-47786619EF53"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchwork.kernel.org/project/linux-wireless/patch/51fd8f76494348aa9ecbf0abc471ebe47a983dfd.1679502607.git.lorenzo@kernel.org/",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,94 @@
|
||||
"id": "CVE-2023-34671",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-23T18:15:13.927",
|
||||
"lastModified": "2023-06-23T19:24:31.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-05T15:42:10.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Access Control leads to privilege escalation affecting Elenos ETG150 FM transmitter running on version 3.12 by exploiting user's role in the user profile. An attack could occur over the public Internet in some cases."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:elenos:etg150_fm_firmware:3.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE2C6198-3596-42AF-9649-6DC0F7086389"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:elenos:etg150_fm:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "911128AF-EBAD-425B-A754-93F89FDB57E4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://elenos.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://strik3r.gitbook.io/strik3r-blog/security-research/cves-pocs/cve-2023-34671",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-359xx/CVE-2023-35971.json
Normal file
43
CVE-2023/CVE-2023-359xx/CVE-2023-35971.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-35971",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-07-05T15:15:09.277",
|
||||
"lastModified": "2023-07-05T15:15:09.277",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the ArubaOS web-based management interface could allow an unauthenticated remote attacker to\u00a0conduct a stored cross-site scripting (XSS) attack against a\u00a0user of the interface. A successful exploit could\u00a0allow an attacker to execute arbitrary script code in a\u00a0victim's browser in the context of the affected interface."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-359xx/CVE-2023-35972.json
Normal file
43
CVE-2023/CVE-2023-359xx/CVE-2023-35972.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-35972",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-07-05T15:15:09.367",
|
||||
"lastModified": "2023-07-05T15:15:09.367",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated remote command injection vulnerability\u00a0exists in the ArubaOS web-based management interface.\u00a0Successful exploitation of this vulnerability results in the\u00a0ability to execute arbitrary commands as a privileged user\u00a0on the underlying operating system. This allows an attacker\u00a0to fully compromise the underlying operating system on the\u00a0device running ArubaOS."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-359xx/CVE-2023-35973.json
Normal file
43
CVE-2023/CVE-2023-359xx/CVE-2023-35973.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-35973",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-07-05T15:15:09.437",
|
||||
"lastModified": "2023-07-05T15:15:09.437",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authenticated command injection vulnerabilities exist in\u00a0the ArubaOS command line interface. Successful exploitation\u00a0of these vulnerabilities result in the ability to execute\u00a0arbitrary commands as a privileged user on the underlying\u00a0operating system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-359xx/CVE-2023-35974.json
Normal file
43
CVE-2023/CVE-2023-359xx/CVE-2023-35974.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-35974",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-07-05T15:15:09.507",
|
||||
"lastModified": "2023-07-05T15:15:09.507",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authenticated command injection vulnerabilities exist in\u00a0the ArubaOS command line interface. Successful exploitation\u00a0of these vulnerabilities result in the ability to execute\u00a0arbitrary commands as a privileged user on the underlying\u00a0operating system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-359xx/CVE-2023-35975.json
Normal file
43
CVE-2023/CVE-2023-359xx/CVE-2023-35975.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-35975",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-07-05T15:15:09.580",
|
||||
"lastModified": "2023-07-05T15:15:09.580",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated path traversal vulnerability exists in the\u00a0ArubaOS command line interface. Successful exploitation of\u00a0this vulnerability results in the ability to delete arbitrary\u00a0files in the underlying operating system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-359xx/CVE-2023-35976.json
Normal file
43
CVE-2023/CVE-2023-359xx/CVE-2023-35976.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-35976",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-07-05T15:15:09.650",
|
||||
"lastModified": "2023-07-05T15:15:09.650",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerabilities exist which allow an authenticated attacker\u00a0to access sensitive information on the ArubaOS command line\u00a0interface. Successful exploitation could allow access to data\u00a0beyond what is authorized by the users existing privilege\u00a0level."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-359xx/CVE-2023-35977.json
Normal file
43
CVE-2023/CVE-2023-359xx/CVE-2023-35977.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-35977",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-07-05T15:15:09.720",
|
||||
"lastModified": "2023-07-05T15:15:09.720",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerabilities exist which allow an authenticated attacker\u00a0to access sensitive information on the ArubaOS command line\u00a0interface. Successful exploitation could allow access to data\u00a0beyond what is authorized by the users existing privilege\u00a0level."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-359xx/CVE-2023-35978.json
Normal file
43
CVE-2023/CVE-2023-359xx/CVE-2023-35978.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-35978",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-07-05T15:15:09.790",
|
||||
"lastModified": "2023-07-05T15:15:09.790",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in ArubaOS could allow an unauthenticated\u00a0remote attacker to conduct a reflected cross-site scripting\u00a0(XSS) attack against a user of the web-based management\u00a0interface. A successful exploit could allow an attacker to\u00a0execute arbitrary script code in a victim's browser in the\u00a0context of the affected interface."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-359xx/CVE-2023-35979.json
Normal file
43
CVE-2023/CVE-2023-359xx/CVE-2023-35979.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-35979",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-07-05T15:15:09.863",
|
||||
"lastModified": "2023-07-05T15:15:09.863",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is an unauthenticated buffer overflow vulnerability\u00a0in the process controlling the ArubaOS web-based management\u00a0interface. Successful exploitation of this vulnerability\u00a0results in a Denial-of-Service (DoS) condition affecting the\u00a0web-based management interface of the controller."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-35xx/CVE-2023-3515.json
Normal file
59
CVE-2023/CVE-2023-35xx/CVE-2023-3515.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-3515",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-07-05T15:15:09.933",
|
||||
"lastModified": "2023-07-05T15:15:09.933",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Open Redirect in GitHub repository go-gitea/gitea prior to 1.19.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.0,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/go-gitea/gitea/commit/9aaaf980f0ba15611f30568bd67bce3ec12954e2",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/e335cd18-bc4d-4585-adb7-426c817ed053",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-366xx/CVE-2023-36665.json
Normal file
36
CVE-2023/CVE-2023-366xx/CVE-2023-36665.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-36665",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-05T14:15:09.410",
|
||||
"lastModified": "2023-07-05T14:15:09.410",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about \"Object.constructor.prototype.<new-property> = ...;\" whereas CVE-2022-25878 was about \"Object.__proto__.<new-property> = ...;\" instead."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/protobufjs/protobuf.js/commit/e66379f451b0393c27d87b37fa7d271619e16b0d",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/protobufjs/protobuf.js/compare/protobufjs-v7.2.3...protobufjs-v7.2.4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/protobufjs/protobuf.js/pull/1899",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/protobufjs/protobuf.js/releases/tag/protobufjs-v7.2.4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
README.md
64
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-07-05T14:00:28.427170+00:00
|
||||
2023-07-05T16:00:27.379389+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-07-05T13:52:43.647000+00:00
|
||||
2023-07-05T15:53:31.293000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,50 +29,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
219178
|
||||
219189
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
* [CVE-2021-46890](CVE-2021/CVE-2021-468xx/CVE-2021-46890.json) (`2023-07-05T12:15:09.507`)
|
||||
* [CVE-2021-46891](CVE-2021/CVE-2021-468xx/CVE-2021-46891.json) (`2023-07-05T13:15:09.413`)
|
||||
* [CVE-2021-46893](CVE-2021/CVE-2021-468xx/CVE-2021-46893.json) (`2023-07-05T13:15:09.467`)
|
||||
* [CVE-2023-2538](CVE-2023/CVE-2023-25xx/CVE-2023-2538.json) (`2023-07-05T13:15:09.540`)
|
||||
* [CVE-2023-3089](CVE-2023/CVE-2023-30xx/CVE-2023-3089.json) (`2023-07-05T13:15:09.707`)
|
||||
* [CVE-2023-3455](CVE-2023/CVE-2023-34xx/CVE-2023-3455.json) (`2023-07-05T13:15:09.770`)
|
||||
* [CVE-2023-36665](CVE-2023/CVE-2023-366xx/CVE-2023-36665.json) (`2023-07-05T14:15:09.410`)
|
||||
* [CVE-2023-35971](CVE-2023/CVE-2023-359xx/CVE-2023-35971.json) (`2023-07-05T15:15:09.277`)
|
||||
* [CVE-2023-35972](CVE-2023/CVE-2023-359xx/CVE-2023-35972.json) (`2023-07-05T15:15:09.367`)
|
||||
* [CVE-2023-35973](CVE-2023/CVE-2023-359xx/CVE-2023-35973.json) (`2023-07-05T15:15:09.437`)
|
||||
* [CVE-2023-35974](CVE-2023/CVE-2023-359xx/CVE-2023-35974.json) (`2023-07-05T15:15:09.507`)
|
||||
* [CVE-2023-35975](CVE-2023/CVE-2023-359xx/CVE-2023-35975.json) (`2023-07-05T15:15:09.580`)
|
||||
* [CVE-2023-35976](CVE-2023/CVE-2023-359xx/CVE-2023-35976.json) (`2023-07-05T15:15:09.650`)
|
||||
* [CVE-2023-35977](CVE-2023/CVE-2023-359xx/CVE-2023-35977.json) (`2023-07-05T15:15:09.720`)
|
||||
* [CVE-2023-35978](CVE-2023/CVE-2023-359xx/CVE-2023-35978.json) (`2023-07-05T15:15:09.790`)
|
||||
* [CVE-2023-35979](CVE-2023/CVE-2023-359xx/CVE-2023-35979.json) (`2023-07-05T15:15:09.863`)
|
||||
* [CVE-2023-3515](CVE-2023/CVE-2023-35xx/CVE-2023-3515.json) (`2023-07-05T15:15:09.933`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `122`
|
||||
Recently modified CVEs: `12`
|
||||
|
||||
* [CVE-2023-36377](CVE-2023/CVE-2023-363xx/CVE-2023-36377.json) (`2023-07-05T13:00:47.037`)
|
||||
* [CVE-2023-36610](CVE-2023/CVE-2023-366xx/CVE-2023-36610.json) (`2023-07-05T13:00:47.037`)
|
||||
* [CVE-2023-36611](CVE-2023/CVE-2023-366xx/CVE-2023-36611.json) (`2023-07-05T13:00:47.037`)
|
||||
* [CVE-2023-3395](CVE-2023/CVE-2023-33xx/CVE-2023-3395.json) (`2023-07-05T13:00:47.037`)
|
||||
* [CVE-2023-22906](CVE-2023/CVE-2023-229xx/CVE-2023-22906.json) (`2023-07-05T13:00:47.037`)
|
||||
* [CVE-2023-25516](CVE-2023/CVE-2023-255xx/CVE-2023-25516.json) (`2023-07-05T13:00:47.037`)
|
||||
* [CVE-2023-25517](CVE-2023/CVE-2023-255xx/CVE-2023-25517.json) (`2023-07-05T13:00:47.037`)
|
||||
* [CVE-2023-25521](CVE-2023/CVE-2023-255xx/CVE-2023-25521.json) (`2023-07-05T13:00:47.037`)
|
||||
* [CVE-2023-25522](CVE-2023/CVE-2023-255xx/CVE-2023-25522.json) (`2023-07-05T13:00:47.037`)
|
||||
* [CVE-2023-25523](CVE-2023/CVE-2023-255xx/CVE-2023-25523.json) (`2023-07-05T13:00:47.037`)
|
||||
* [CVE-2023-2683](CVE-2023/CVE-2023-26xx/CVE-2023-2683.json) (`2023-07-05T13:13:07.587`)
|
||||
* [CVE-2023-23679](CVE-2023/CVE-2023-236xx/CVE-2023-23679.json) (`2023-07-05T13:13:22.423`)
|
||||
* [CVE-2023-32961](CVE-2023/CVE-2023-329xx/CVE-2023-32961.json) (`2023-07-05T13:15:09.610`)
|
||||
* [CVE-2023-31469](CVE-2023/CVE-2023-314xx/CVE-2023-31469.json) (`2023-07-05T13:21:25.333`)
|
||||
* [CVE-2023-28175](CVE-2023/CVE-2023-281xx/CVE-2023-28175.json) (`2023-07-05T13:25:06.167`)
|
||||
* [CVE-2023-2847](CVE-2023/CVE-2023-28xx/CVE-2023-2847.json) (`2023-07-05T13:28:26.223`)
|
||||
* [CVE-2023-34203](CVE-2023/CVE-2023-342xx/CVE-2023-34203.json) (`2023-07-05T13:29:17.093`)
|
||||
* [CVE-2023-35928](CVE-2023/CVE-2023-359xx/CVE-2023-35928.json) (`2023-07-05T13:30:52.030`)
|
||||
* [CVE-2023-35927](CVE-2023/CVE-2023-359xx/CVE-2023-35927.json) (`2023-07-05T13:32:05.113`)
|
||||
* [CVE-2023-35173](CVE-2023/CVE-2023-351xx/CVE-2023-35173.json) (`2023-07-05T13:33:57.170`)
|
||||
* [CVE-2023-35172](CVE-2023/CVE-2023-351xx/CVE-2023-35172.json) (`2023-07-05T13:34:36.727`)
|
||||
* [CVE-2023-35800](CVE-2023/CVE-2023-358xx/CVE-2023-35800.json) (`2023-07-05T13:40:17.047`)
|
||||
* [CVE-2023-35799](CVE-2023/CVE-2023-357xx/CVE-2023-35799.json) (`2023-07-05T13:42:25.120`)
|
||||
* [CVE-2023-27082](CVE-2023/CVE-2023-270xx/CVE-2023-27082.json) (`2023-07-05T13:43:44.310`)
|
||||
* [CVE-2023-35932](CVE-2023/CVE-2023-359xx/CVE-2023-35932.json) (`2023-07-05T13:52:43.647`)
|
||||
* [CVE-2020-20210](CVE-2020/CVE-2020-202xx/CVE-2020-20210.json) (`2023-07-05T15:15:54.197`)
|
||||
* [CVE-2022-4488](CVE-2022/CVE-2022-44xx/CVE-2022-4488.json) (`2023-07-05T14:15:09.310`)
|
||||
* [CVE-2022-25883](CVE-2022/CVE-2022-258xx/CVE-2022-25883.json) (`2023-07-05T15:49:56.963`)
|
||||
* [CVE-2023-25003](CVE-2023/CVE-2023-250xx/CVE-2023-25003.json) (`2023-07-05T14:10:42.223`)
|
||||
* [CVE-2023-3317](CVE-2023/CVE-2023-33xx/CVE-2023-3317.json) (`2023-07-05T14:39:38.013`)
|
||||
* [CVE-2023-3132](CVE-2023/CVE-2023-31xx/CVE-2023-3132.json) (`2023-07-05T15:27:20.383`)
|
||||
* [CVE-2023-32229](CVE-2023/CVE-2023-322xx/CVE-2023-32229.json) (`2023-07-05T15:31:03.920`)
|
||||
* [CVE-2023-34671](CVE-2023/CVE-2023-346xx/CVE-2023-34671.json) (`2023-07-05T15:42:10.257`)
|
||||
* [CVE-2023-25186](CVE-2023/CVE-2023-251xx/CVE-2023-25186.json) (`2023-07-05T15:48:07.843`)
|
||||
* [CVE-2023-30258](CVE-2023/CVE-2023-302xx/CVE-2023-30258.json) (`2023-07-05T15:51:17.353`)
|
||||
* [CVE-2023-33725](CVE-2023/CVE-2023-337xx/CVE-2023-33725.json) (`2023-07-05T15:52:44.110`)
|
||||
* [CVE-2023-26115](CVE-2023/CVE-2023-261xx/CVE-2023-26115.json) (`2023-07-05T15:53:31.293`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user