Auto-Update: 2023-07-05T16:00:27.379389+00:00

This commit is contained in:
cad-safe-bot 2023-07-05 16:00:30 +00:00
parent 6c6a18a0eb
commit 9c9c28a43d
24 changed files with 1763 additions and 91 deletions

View File

@ -2,19 +2,79 @@
"id": "CVE-2020-20210",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-26T18:15:09.407",
"lastModified": "2023-06-26T22:13:28.460",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-05T15:15:54.197",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Bludit 3.9.2 is vulnerable to Remote Code Execution (RCE) via /admin/ajax/upload-images."
},
{
"lang": "es",
"value": "Bludit versi\u00f3n 3.9.2 es vulnerable a ejecuci\u00f3n de c\u00f3digo remoto (RCE) a trav\u00e9s de \"/admin/ajax/upload-images\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bludit:bludit:3.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "10A81FA4-0E1B-4680-A04F-E4D2267A98E2"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/bludit/bludit/issues/1079",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-25883",
"sourceIdentifier": "report@snyk.io",
"published": "2023-06-21T05:15:09.060",
"lastModified": "2023-06-21T12:29:48.917",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-05T15:49:56.963",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "report@snyk.io",
"type": "Secondary",
@ -34,30 +54,81 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:npmjs:semver:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "7.5.2",
"matchCriteriaId": "0567A5E5-9098-41E3-AB28-569127D89FA8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L138",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L160",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/npm/node-semver/pull/564",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-4488",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-13T15:15:17.207",
"lastModified": "2023-02-23T04:46:26.460",
"vulnStatus": "Analyzed",
"lastModified": "2023-07-05T14:15:09.310",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The Widgets on Pages WordPress plugin through 1.6.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins."
"value": "The Widgets on Pages WordPress plugin before 1.8.0 does not validate and escape its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins."
}
],
"metrics": {

View File

@ -2,19 +2,444 @@
"id": "CVE-2023-25003",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2023-06-23T19:15:08.983",
"lastModified": "2023-06-23T19:24:31.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-05T14:10:42.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted pskernel.dll file in Autodesk AutoCAD 2023 and Maya 2022 may be used to trigger out-of-bound read write / read vulnerabilities. Exploitation of this vulnerability may lead to code execution."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:alias:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.1.1",
"matchCriteriaId": "19760052-9480-46D8-B5A3-7F6FE3F74ED6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2020",
"versionEndExcluding": "2020.1.6",
"matchCriteriaId": "5269098B-1C20-4754-99F9-0A6B97E1490D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.1.3",
"matchCriteriaId": "00EACCCC-CD89-490B-BBC1-F06EA6867AFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.1.3",
"matchCriteriaId": "5829F52D-F61C-4B79-B724-3388B1B1723A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.1.1",
"matchCriteriaId": "70C48E66-DF91-4F0B-B93D-F6372BFC55C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2020",
"versionEndExcluding": "2020.1.6",
"matchCriteriaId": "B85E0DDB-60A9-4AEA-BAA3-34E8DF25BF96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.1.3",
"matchCriteriaId": "179FB815-E469-42A1-91CB-B766891C7552"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.1.3",
"matchCriteriaId": "CCB04040-8C83-4381-B762-61F0ED8C8CC0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.1.1",
"matchCriteriaId": "57C7CD03-53D7-4224-82AE-F7CD929E3F92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2020",
"versionEndExcluding": "2020.1.6",
"matchCriteriaId": "05FD0056-F524-4475-BB41-0A4CC6E7A3EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.1.3",
"matchCriteriaId": "ADE81778-A65F-4A23-BDAC-AC28434E0887"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.1.3",
"matchCriteriaId": "D042F7CF-2694-437E-B60A-4C324EBAB1F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.1.1",
"matchCriteriaId": "DF68C32D-7015-4513-BEB2-2CFD08DC799B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2020",
"versionEndExcluding": "2020.1.6",
"matchCriteriaId": "C5FC936E-91AC-4810-9A34-7384096A4922"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.1.3",
"matchCriteriaId": "D284FACA-DB0C-4182-96B7-F46EE28B0C54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.1.3",
"matchCriteriaId": "5A628855-3BE7-4B40-AFB7-7819CBD88D21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.1.1",
"matchCriteriaId": "A42B62B9-0ABA-4BE8-9115-6E633664FCE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2020",
"versionEndExcluding": "2020.1.6",
"matchCriteriaId": "6A46B444-4436-4101-ABF8-DCF3F4E75D18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.1.3",
"matchCriteriaId": "E8994887-8E6A-4F6D-8A52-AB676E251B9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.1.3",
"matchCriteriaId": "731F5891-D398-49AE-BA04-179D9FD18ED2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.1.1",
"matchCriteriaId": "E009D956-E27B-435B-A308-9279A7DA2087"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2020",
"versionEndExcluding": "2020.1.6",
"matchCriteriaId": "07A37B8B-7345-463B-A074-D8C2F242A311"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.1.3",
"matchCriteriaId": "85F1017C-4552-4A97-B911-8785EF5DC9A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.1.3",
"matchCriteriaId": "0982CCA5-8834-43D7-8596-F330D7A0A52B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.1.1",
"matchCriteriaId": "B937A033-FDA2-461E-8697-2341A9DE23DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2020",
"versionEndExcluding": "2020.1.6",
"matchCriteriaId": "A971D35C-8570-48E2-A6A6-0B2B5966BA56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.1.3",
"matchCriteriaId": "4C0FA7D7-85D0-4E32-950E-1DE6D0C4342C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.1.3",
"matchCriteriaId": "6FABCBE5-BF7B-4D2E-A886-8D38B3B82872"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.1.1",
"matchCriteriaId": "19A43BB0-22A6-4715-B556-1DE7CDCAF616"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2020",
"versionEndExcluding": "2020.1.6",
"matchCriteriaId": "CF5BB84E-2F7B-4CC5-81F2-884562C1A18A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.1.3",
"matchCriteriaId": "3E60EF97-0AA1-480F-B03E-26709C58030F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.1.3",
"matchCriteriaId": "EC2B3E51-4AAD-4A1E-951D-6428A0C8D6BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.1.1",
"matchCriteriaId": "DE681603-E303-4759-B301-37BACF233C76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2020",
"versionEndExcluding": "2020.1.6",
"matchCriteriaId": "29A021AB-AFB3-473C-8111-AB0C9D10C805"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.1.3",
"matchCriteriaId": "48F4A0E1-8004-40DF-8700-35B6BE99F3C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.1.3",
"matchCriteriaId": "D1456E3E-3B38-42E2-96FE-B14361E30CB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.1.1",
"matchCriteriaId": "E9601144-D1E1-4F8A-A6C0-447E17F14337"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2020",
"versionEndExcluding": "2020.1.6",
"matchCriteriaId": "2AA1C57D-9B7E-438B-AD71-784F29B8A185"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.1.3",
"matchCriteriaId": "21BE9909-DAA0-4A7C-8AAA-42A984FA0AF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.1.3",
"matchCriteriaId": "74942A53-8D7E-4706-B9C3-EB1C03488684"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.1.1",
"matchCriteriaId": "4B95D329-E683-4128-8FC4-300CA974F1F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.2",
"matchCriteriaId": "FE68AFE1-0F44-4B37-87E5-C7D658186425"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.1",
"matchCriteriaId": "089B7B95-60DC-44AD-A3A8-0F4844CEFB22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.1",
"matchCriteriaId": "1F89B484-5A9E-4C22-A9F7-976EF556C08A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.5",
"matchCriteriaId": "DB97A508-D0AC-47D2-8CA3-156063FFC136"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.4",
"matchCriteriaId": "D35916C1-A782-42AC-B4D4-4131D8F430C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.3.1",
"matchCriteriaId": "7A104E6A-8018-4F7F-ADBB-C1F3B29E4F8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:maya_usd:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.5",
"matchCriteriaId": "8389D668-78CB-4CF9-85E0-E37A10D35698"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:maya_usd:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.3",
"matchCriteriaId": "35B34667-2549-4EEE-B4F6-930DF7A7A8EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.4",
"matchCriteriaId": "BB7E7583-0389-4959-B08E-BA433A32A84C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.2",
"matchCriteriaId": "E32A04AB-5C19-4328-9240-5A030E904726"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021",
"versionEndExcluding": "2021.1.8",
"matchCriteriaId": "3392ACCC-079C-4AF8-A0A8-408711C9D094"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:vred:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023",
"versionEndExcluding": "2023.4",
"matchCriteriaId": "CDF50B0E-69C5-4AD9-8C85-E695834E51BE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0009",
"source": "psirt@autodesk.com"
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25186",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-16T19:15:14.423",
"lastModified": "2023-06-17T02:32:29.473",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-05T15:48:07.843",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.8,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.3,
"impactScore": 1.4
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -34,14 +54,81 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:19b:*:*:*:*:*:*:*",
"matchCriteriaId": "FE8E3A0E-3B21-49D8-A4EE-33FE5FBA7B51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:20a:*:*:*:*:*:*:*",
"matchCriteriaId": "A612E565-7686-4C20-99AF-67B283328A42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:20b:*:*:*:*:*:*:*",
"matchCriteriaId": "5AE52024-F5EE-42F6-AC3A-702E87B1ABF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:20c:*:*:*:*:*:*:*",
"matchCriteriaId": "DA68A71E-A8FB-4448-BE75-318E4582FC43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nokia:asika_airscale_firmware:21a:*:*:*:*:*:*:*",
"matchCriteriaId": "B2FAA373-A46D-48A6-8A08-F66F4F3604C7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nokia:asika_airscale:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61C0B724-C7EA-4214-98CF-49812292332B"
}
]
}
]
}
],
"references": [
{
"url": "https://Nokia.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25186/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26115",
"sourceIdentifier": "report@snyk.io",
"published": "2023-06-22T05:15:09.157",
"lastModified": "2023-06-22T12:51:30.407",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-05T15:53:31.293",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "report@snyk.io",
"type": "Secondary",
@ -34,18 +54,58 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:word-wrap_project:word-wrap:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "04B48B0A-8B67-4838-A1E0-EB3CB727A813"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jonschlinkert/word-wrap/blob/master/index.js%23L39",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Broken Link"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,85 @@
"id": "CVE-2023-30258",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-23T12:15:09.473",
"lastModified": "2023-06-23T13:03:18.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-05T15:51:17.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magnussolution:magnusbilling:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndIncluding": "7.3.0",
"matchCriteriaId": "5431D799-492A-4081-9BAB-9CA1C25A3A3C"
}
]
}
]
}
],
"references": [
{
"url": "https://eldstal.se/advisories/230327-magnusbilling.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://github.com/magnussolution/magnusbilling7/commit/ccff9f6370f530cc41ef7de2e31d7590a0fdb8c3",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3132",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-27T03:15:09.913",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-05T15:27:20.383",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -40,8 +60,18 @@
},
"weaknesses": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -50,14 +80,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mainwp:mainwp_child:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.4.1.1",
"matchCriteriaId": "8D02314E-0463-4C00-B1B9-3D5DC7E7AF33"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2923512%40mainwp-child&new=2923512%40mainwp-child&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a1fadba1-674f-4f3d-997f-d29d3a887414?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32229",
"sourceIdentifier": "psirt@bosch.com",
"published": "2023-06-15T11:15:09.347",
"lastModified": "2023-06-15T12:39:17.910",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-05T15:31:03.920",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "psirt@bosch.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
},
{
"source": "psirt@bosch.com",
"type": "Secondary",
@ -46,10 +76,137 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:bosch:cpp13_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.48.0017",
"matchCriteriaId": "AD4868B9-C8F0-4D7F-A1E7-779380F3A866"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:autodome_7000i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8ABA51A-F226-4BFB-8871-98943BF36B32"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:autodome_7100_ir:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB793E28-199E-4F3C-9361-C68741F4F3E2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:autodome_inteox_7000i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "601B9B20-0A4F-4732-A72A-7D162EBDA624"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:dinion_inteox_7100i_ir:-:*:*:*:*:*:*:*",
"matchCriteriaId": "160F398A-9464-4BC6-9845-04B8C8780C07"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:flexidome_inteox_7100i_ir:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41995790-0676-4E0F-B5EF-DED421D7702E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:mic_inteox_7100i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01E87B20-A885-483E-AEBB-445A45BBFC5C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:bosch:cpp14_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.50",
"versionEndExcluding": "8.80.0090",
"matchCriteriaId": "63996E8C-448D-44B7-8B4B-D1F881C48497"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:dinion_7100i_ir:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CCB0F1-42BE-4314-B30D-19635D6D276A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:flexidome_indoor_5100i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EBA7AD4-9004-45E6-BEC1-4299A5BFD661"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:flexidome_indoor_5100i_ir:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC9FEC11-38CD-4945-83CD-B8A018EB3DA1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:flexidome_multi_7000i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C7B6F8-7555-4D14-9DDB-299A009089B1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:flexidome_multi_7000i_ir:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6EB8EFD-FBA5-4D03-877C-B3D20BAAD9D8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:flexidome_outdoor_5100i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDBA29C-0C42-4326-AE2D-7597D5EA3232"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:flexidome_outdoor_5100i_ir:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3618E7E0-DFC3-40D2-B1DF-85718D9596E4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:flexidome_panoramic_5100i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B75764-3CE3-40F1-A34C-23C938BE0C9D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:bosch:flexidome_panoramic_5100i_ir:-:*:*:*:*:*:*:*",
"matchCriteriaId": "112CA854-16FB-4430-9F02-BC2CD90E9696"
}
]
}
]
}
],
"references": [
{
"url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-435698-BT.html",
"source": "psirt@bosch.com"
"source": "psirt@bosch.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,85 @@
"id": "CVE-2023-33725",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-21T16:15:11.413",
"lastModified": "2023-06-21T18:57:48.280",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-05T15:52:44.110",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Broadleaf 5.x and 6.x (including 5.2.25-GA and 6.2.6-GA) was discovered to contain a cross-site scripting (XSS) vulnerability via a customer signup with a crafted email address. This is fixed in 6.2.6.1-GA."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadleafcommerce:broadleaf_commerce:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0",
"versionEndIncluding": "5.2.25-ga",
"matchCriteriaId": "99269270-23EE-49A1-932A-D639D0353698"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:broadleafcommerce:broadleaf_commerce:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0",
"versionEndExcluding": "6.2.6.1-ga",
"matchCriteriaId": "277130E0-4FBB-4D44-A5A8-C04F8E98B138"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Contrast-Security-OSS/Burptrast/tree/main/docs/CVE-2023-33725",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,49 @@
"id": "CVE-2023-3317",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-23T18:15:14.047",
"lastModified": "2023-06-23T19:24:31.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-05T14:39:38.013",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free flaw was found in mt7921_check_offload_capability in drivers/net/wireless/mediatek/mt76/mt7921/init.c in wifi mt76/mt7921 sub-component in the Linux Kernel. This flaw could allow an attacker to crash the system after 'features' memory release. This vulnerability could even lead to a kernel information leak problem."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -23,10 +56,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3",
"matchCriteriaId": "3769AA63-B0A8-4EF1-96F9-6A6A6B305A02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:-:*:*:*:*:*:*",
"matchCriteriaId": "21D6F467-B848-453E-B1A4-BEF940E413A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B8E3B0E8-FA27-4305-87BB-AF6C25B160CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "A47F0FC3-CE52-4BA1-BA51-22F783938431"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3583026A-27EC-4A4C-850A-83F2AF970673"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*",
"matchCriteriaId": "DC271202-7570-4505-89A4-D602D47BFD00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*",
"matchCriteriaId": "D413BB6D-4F74-4C7D-9163-47786619EF53"
}
]
}
]
}
],
"references": [
{
"url": "https://patchwork.kernel.org/project/linux-wireless/patch/51fd8f76494348aa9ecbf0abc471ebe47a983dfd.1679502607.git.lorenzo@kernel.org/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,23 +2,94 @@
"id": "CVE-2023-34671",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-23T18:15:13.927",
"lastModified": "2023-06-23T19:24:31.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-05T15:42:10.257",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Access Control leads to privilege escalation affecting Elenos ETG150 FM transmitter running on version 3.12 by exploiting user's role in the user profile. An attack could occur over the public Internet in some cases."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:elenos:etg150_fm_firmware:3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2C6198-3596-42AF-9649-6DC0F7086389"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:elenos:etg150_fm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "911128AF-EBAD-425B-A754-93F89FDB57E4"
}
]
}
]
}
],
"references": [
{
"url": "http://elenos.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://strik3r.gitbook.io/strik3r-blog/security-research/cves-pocs/cve-2023-34671",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-35971",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-07-05T15:15:09.277",
"lastModified": "2023-07-05T15:15:09.277",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the ArubaOS web-based management interface could allow an unauthenticated remote attacker to\u00a0conduct a stored cross-site scripting (XSS) attack against a\u00a0user of the interface. A successful exploit could\u00a0allow an attacker to execute arbitrary script code in a\u00a0victim's browser in the context of the affected interface."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-35972",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-07-05T15:15:09.367",
"lastModified": "2023-07-05T15:15:09.367",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An authenticated remote command injection vulnerability\u00a0exists in the ArubaOS web-based management interface.\u00a0Successful exploitation of this vulnerability results in the\u00a0ability to execute arbitrary commands as a privileged user\u00a0on the underlying operating system. This allows an attacker\u00a0to fully compromise the underlying operating system on the\u00a0device running ArubaOS."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-35973",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-07-05T15:15:09.437",
"lastModified": "2023-07-05T15:15:09.437",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Authenticated command injection vulnerabilities exist in\u00a0the ArubaOS command line interface. Successful exploitation\u00a0of these vulnerabilities result in the ability to execute\u00a0arbitrary commands as a privileged user on the underlying\u00a0operating system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-35974",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-07-05T15:15:09.507",
"lastModified": "2023-07-05T15:15:09.507",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Authenticated command injection vulnerabilities exist in\u00a0the ArubaOS command line interface. Successful exploitation\u00a0of these vulnerabilities result in the ability to execute\u00a0arbitrary commands as a privileged user on the underlying\u00a0operating system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-35975",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-07-05T15:15:09.580",
"lastModified": "2023-07-05T15:15:09.580",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An authenticated path traversal vulnerability exists in the\u00a0ArubaOS command line interface. Successful exploitation of\u00a0this vulnerability results in the ability to delete arbitrary\u00a0files in the underlying operating system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-35976",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-07-05T15:15:09.650",
"lastModified": "2023-07-05T15:15:09.650",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vulnerabilities exist which allow an authenticated attacker\u00a0to access sensitive information on the ArubaOS command line\u00a0interface. Successful exploitation could allow access to data\u00a0beyond what is authorized by the users existing privilege\u00a0level."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-35977",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-07-05T15:15:09.720",
"lastModified": "2023-07-05T15:15:09.720",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vulnerabilities exist which allow an authenticated attacker\u00a0to access sensitive information on the ArubaOS command line\u00a0interface. Successful exploitation could allow access to data\u00a0beyond what is authorized by the users existing privilege\u00a0level."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-35978",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-07-05T15:15:09.790",
"lastModified": "2023-07-05T15:15:09.790",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in ArubaOS could allow an unauthenticated\u00a0remote attacker to conduct a reflected cross-site scripting\u00a0(XSS) attack against a user of the web-based management\u00a0interface. A successful exploit could allow an attacker to\u00a0execute arbitrary script code in a victim's browser in the\u00a0context of the affected interface."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-35979",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-07-05T15:15:09.863",
"lastModified": "2023-07-05T15:15:09.863",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is an unauthenticated buffer overflow vulnerability\u00a0in the process controlling the ArubaOS web-based management\u00a0interface. Successful exploitation of this vulnerability\u00a0results in a Denial-of-Service (DoS) condition affecting the\u00a0web-based management interface of the controller."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-3515",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-07-05T15:15:09.933",
"lastModified": "2023-07-05T15:15:09.933",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Open Redirect in GitHub repository go-gitea/gitea prior to 1.19.4."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.0,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/go-gitea/gitea/commit/9aaaf980f0ba15611f30568bd67bce3ec12954e2",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/e335cd18-bc4d-4585-adb7-426c817ed053",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-36665",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-05T14:15:09.410",
"lastModified": "2023-07-05T14:15:09.410",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about \"Object.constructor.prototype.<new-property> = ...;\" whereas CVE-2022-25878 was about \"Object.__proto__.<new-property> = ...;\" instead."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/protobufjs/protobuf.js/commit/e66379f451b0393c27d87b37fa7d271619e16b0d",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/protobufjs/protobuf.js/compare/protobufjs-v7.2.3...protobufjs-v7.2.4",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/protobufjs/protobuf.js/pull/1899",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/protobufjs/protobuf.js/releases/tag/protobufjs-v7.2.4",
"source": "cve@mitre.org"
},
{
"url": "https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-07-05T14:00:28.427170+00:00
2023-07-05T16:00:27.379389+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-07-05T13:52:43.647000+00:00
2023-07-05T15:53:31.293000+00:00
```
### Last Data Feed Release
@ -29,50 +29,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
219178
219189
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `11`
* [CVE-2021-46890](CVE-2021/CVE-2021-468xx/CVE-2021-46890.json) (`2023-07-05T12:15:09.507`)
* [CVE-2021-46891](CVE-2021/CVE-2021-468xx/CVE-2021-46891.json) (`2023-07-05T13:15:09.413`)
* [CVE-2021-46893](CVE-2021/CVE-2021-468xx/CVE-2021-46893.json) (`2023-07-05T13:15:09.467`)
* [CVE-2023-2538](CVE-2023/CVE-2023-25xx/CVE-2023-2538.json) (`2023-07-05T13:15:09.540`)
* [CVE-2023-3089](CVE-2023/CVE-2023-30xx/CVE-2023-3089.json) (`2023-07-05T13:15:09.707`)
* [CVE-2023-3455](CVE-2023/CVE-2023-34xx/CVE-2023-3455.json) (`2023-07-05T13:15:09.770`)
* [CVE-2023-36665](CVE-2023/CVE-2023-366xx/CVE-2023-36665.json) (`2023-07-05T14:15:09.410`)
* [CVE-2023-35971](CVE-2023/CVE-2023-359xx/CVE-2023-35971.json) (`2023-07-05T15:15:09.277`)
* [CVE-2023-35972](CVE-2023/CVE-2023-359xx/CVE-2023-35972.json) (`2023-07-05T15:15:09.367`)
* [CVE-2023-35973](CVE-2023/CVE-2023-359xx/CVE-2023-35973.json) (`2023-07-05T15:15:09.437`)
* [CVE-2023-35974](CVE-2023/CVE-2023-359xx/CVE-2023-35974.json) (`2023-07-05T15:15:09.507`)
* [CVE-2023-35975](CVE-2023/CVE-2023-359xx/CVE-2023-35975.json) (`2023-07-05T15:15:09.580`)
* [CVE-2023-35976](CVE-2023/CVE-2023-359xx/CVE-2023-35976.json) (`2023-07-05T15:15:09.650`)
* [CVE-2023-35977](CVE-2023/CVE-2023-359xx/CVE-2023-35977.json) (`2023-07-05T15:15:09.720`)
* [CVE-2023-35978](CVE-2023/CVE-2023-359xx/CVE-2023-35978.json) (`2023-07-05T15:15:09.790`)
* [CVE-2023-35979](CVE-2023/CVE-2023-359xx/CVE-2023-35979.json) (`2023-07-05T15:15:09.863`)
* [CVE-2023-3515](CVE-2023/CVE-2023-35xx/CVE-2023-3515.json) (`2023-07-05T15:15:09.933`)
### CVEs modified in the last Commit
Recently modified CVEs: `122`
Recently modified CVEs: `12`
* [CVE-2023-36377](CVE-2023/CVE-2023-363xx/CVE-2023-36377.json) (`2023-07-05T13:00:47.037`)
* [CVE-2023-36610](CVE-2023/CVE-2023-366xx/CVE-2023-36610.json) (`2023-07-05T13:00:47.037`)
* [CVE-2023-36611](CVE-2023/CVE-2023-366xx/CVE-2023-36611.json) (`2023-07-05T13:00:47.037`)
* [CVE-2023-3395](CVE-2023/CVE-2023-33xx/CVE-2023-3395.json) (`2023-07-05T13:00:47.037`)
* [CVE-2023-22906](CVE-2023/CVE-2023-229xx/CVE-2023-22906.json) (`2023-07-05T13:00:47.037`)
* [CVE-2023-25516](CVE-2023/CVE-2023-255xx/CVE-2023-25516.json) (`2023-07-05T13:00:47.037`)
* [CVE-2023-25517](CVE-2023/CVE-2023-255xx/CVE-2023-25517.json) (`2023-07-05T13:00:47.037`)
* [CVE-2023-25521](CVE-2023/CVE-2023-255xx/CVE-2023-25521.json) (`2023-07-05T13:00:47.037`)
* [CVE-2023-25522](CVE-2023/CVE-2023-255xx/CVE-2023-25522.json) (`2023-07-05T13:00:47.037`)
* [CVE-2023-25523](CVE-2023/CVE-2023-255xx/CVE-2023-25523.json) (`2023-07-05T13:00:47.037`)
* [CVE-2023-2683](CVE-2023/CVE-2023-26xx/CVE-2023-2683.json) (`2023-07-05T13:13:07.587`)
* [CVE-2023-23679](CVE-2023/CVE-2023-236xx/CVE-2023-23679.json) (`2023-07-05T13:13:22.423`)
* [CVE-2023-32961](CVE-2023/CVE-2023-329xx/CVE-2023-32961.json) (`2023-07-05T13:15:09.610`)
* [CVE-2023-31469](CVE-2023/CVE-2023-314xx/CVE-2023-31469.json) (`2023-07-05T13:21:25.333`)
* [CVE-2023-28175](CVE-2023/CVE-2023-281xx/CVE-2023-28175.json) (`2023-07-05T13:25:06.167`)
* [CVE-2023-2847](CVE-2023/CVE-2023-28xx/CVE-2023-2847.json) (`2023-07-05T13:28:26.223`)
* [CVE-2023-34203](CVE-2023/CVE-2023-342xx/CVE-2023-34203.json) (`2023-07-05T13:29:17.093`)
* [CVE-2023-35928](CVE-2023/CVE-2023-359xx/CVE-2023-35928.json) (`2023-07-05T13:30:52.030`)
* [CVE-2023-35927](CVE-2023/CVE-2023-359xx/CVE-2023-35927.json) (`2023-07-05T13:32:05.113`)
* [CVE-2023-35173](CVE-2023/CVE-2023-351xx/CVE-2023-35173.json) (`2023-07-05T13:33:57.170`)
* [CVE-2023-35172](CVE-2023/CVE-2023-351xx/CVE-2023-35172.json) (`2023-07-05T13:34:36.727`)
* [CVE-2023-35800](CVE-2023/CVE-2023-358xx/CVE-2023-35800.json) (`2023-07-05T13:40:17.047`)
* [CVE-2023-35799](CVE-2023/CVE-2023-357xx/CVE-2023-35799.json) (`2023-07-05T13:42:25.120`)
* [CVE-2023-27082](CVE-2023/CVE-2023-270xx/CVE-2023-27082.json) (`2023-07-05T13:43:44.310`)
* [CVE-2023-35932](CVE-2023/CVE-2023-359xx/CVE-2023-35932.json) (`2023-07-05T13:52:43.647`)
* [CVE-2020-20210](CVE-2020/CVE-2020-202xx/CVE-2020-20210.json) (`2023-07-05T15:15:54.197`)
* [CVE-2022-4488](CVE-2022/CVE-2022-44xx/CVE-2022-4488.json) (`2023-07-05T14:15:09.310`)
* [CVE-2022-25883](CVE-2022/CVE-2022-258xx/CVE-2022-25883.json) (`2023-07-05T15:49:56.963`)
* [CVE-2023-25003](CVE-2023/CVE-2023-250xx/CVE-2023-25003.json) (`2023-07-05T14:10:42.223`)
* [CVE-2023-3317](CVE-2023/CVE-2023-33xx/CVE-2023-3317.json) (`2023-07-05T14:39:38.013`)
* [CVE-2023-3132](CVE-2023/CVE-2023-31xx/CVE-2023-3132.json) (`2023-07-05T15:27:20.383`)
* [CVE-2023-32229](CVE-2023/CVE-2023-322xx/CVE-2023-32229.json) (`2023-07-05T15:31:03.920`)
* [CVE-2023-34671](CVE-2023/CVE-2023-346xx/CVE-2023-34671.json) (`2023-07-05T15:42:10.257`)
* [CVE-2023-25186](CVE-2023/CVE-2023-251xx/CVE-2023-25186.json) (`2023-07-05T15:48:07.843`)
* [CVE-2023-30258](CVE-2023/CVE-2023-302xx/CVE-2023-30258.json) (`2023-07-05T15:51:17.353`)
* [CVE-2023-33725](CVE-2023/CVE-2023-337xx/CVE-2023-33725.json) (`2023-07-05T15:52:44.110`)
* [CVE-2023-26115](CVE-2023/CVE-2023-261xx/CVE-2023-26115.json) (`2023-07-05T15:53:31.293`)
## Download and Usage