Auto-Update: 2023-06-27T16:00:27.568906+00:00

This commit is contained in:
cad-safe-bot 2023-06-27 16:00:30 +00:00
parent 8b23488a72
commit a24715143f
113 changed files with 2719 additions and 260 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2017-4947",
"sourceIdentifier": "security@vmware.com",
"published": "2018-01-29T16:29:00.730",
"lastModified": "2018-02-27T18:38:23.130",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-27T15:15:09.240",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "VMware Realize Automation (7.3 and 7.2) and vSphere Integrated Containers (1.x before 1.3) contain a deserialization vulnerability via Xenon. Successful exploitation of this issue may allow remote attackers to execute arbitrary code on the appliance."
"value": "VMware vRealize Automation (7.3 and 7.2) and vSphere Integrated Containers (1.x before 1.3) contain a deserialization vulnerability via Xenon. Successful exploitation of this issue may allow remote attackers to execute arbitrary code on the appliance.\n\n"
},
{
"lang": "es",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-30203",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-27T14:15:09.667",
"lastModified": "2023-06-27T14:15:09.667",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A reflected cross-site scripting (XSS) vulnerability in the zero parameter of dzzoffice 2.02.1_SC_UTF8 allows attackers to execute arbitrary web scripts or HTML."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/zyx0814/dzzoffice/issues/183",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-30205",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-27T14:15:09.737",
"lastModified": "2023-06-27T14:15:09.737",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in the component /index.php?mod=system&op=orgtree of dzzoffice 2.02.1_SC_UTF8 allows unauthenticated attackers to browse departments and usernames."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/zyx0814/dzzoffice/issues/184",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-37404",
"sourceIdentifier": "security@apache.org",
"published": "2022-06-13T07:15:08.327",
"lastModified": "2023-06-26T17:58:44.603",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-27T15:15:09.823",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -65,7 +65,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security@apache.org",
"type": "Primary",
"description": [
{
@ -75,12 +75,12 @@
]
},
{
"source": "security@apache.org",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-131"
"value": "CWE-787"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45046",
"sourceIdentifier": "security@apache.org",
"published": "2021-12-14T19:15:07.733",
"lastModified": "2023-06-26T19:04:30.537",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-27T14:15:09.800",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-05-01",
"cisaActionDue": "2023-05-22",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -69,7 +69,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security@apache.org",
"type": "Primary",
"description": [
{
@ -79,12 +79,12 @@
]
},
{
"source": "security@apache.org",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
"value": "CWE-917"
}
]
}
@ -817,20 +817,12 @@
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/",
"source": "security@apache.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/",
"source": "security@apache.org"
},
{
"url": "https://logging.apache.org/log4j/2.x/security.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0902",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2022-07-21T16:15:08.610",
"lastModified": "2022-07-28T18:56:05.750",
"lastModified": "2023-06-27T15:50:28.677",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -66,10 +66,6 @@
{
"lang": "en",
"value": "CWE-22"
},
{
"lang": "en",
"value": "CWE-77"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1016",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-08-29T15:15:10.143",
"lastModified": "2023-02-12T22:15:22.407",
"vulnStatus": "Modified",
"lastModified": "2023-06-27T15:47:56.347",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -40,22 +40,22 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-824"
"value": "CWE-909"
}
]
},
{
"source": "nvd@nist.gov",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
"value": "CWE-824"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1025",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-07-12T21:15:09.277",
"lastModified": "2023-02-12T22:15:22.517",
"vulnStatus": "Modified",
"lastModified": "2023-06-27T15:54:30.907",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -65,8 +65,18 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -77,16 +87,6 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1245",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-07-08T00:15:07.937",
"lastModified": "2022-07-15T17:10:42.960",
"lastModified": "2023-06-27T15:57:06.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-862"
"value": "CWE-639"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1323",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-08-08T14:15:08.457",
"lastModified": "2022-08-12T15:33:33.917",
"lastModified": "2023-06-27T15:50:04.507",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,18 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1373",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-08-17T21:15:08.647",
"lastModified": "2022-08-19T01:13:40.017",
"lastModified": "2023-06-27T15:49:41.903",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -60,8 +60,18 @@
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1572",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-06-27T09:15:09.120",
"lastModified": "2022-07-07T15:45:50.653",
"lastModified": "2023-06-27T15:57:42.557",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,8 +65,22 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1574",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-06-27T09:15:09.227",
"lastModified": "2022-07-07T15:47:58.593",
"lastModified": "2023-06-27T15:57:30.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,8 +65,22 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1656",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-06-13T13:15:11.553",
"lastModified": "2022-06-17T23:27:57.257",
"lastModified": "2023-06-27T15:39:00.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -85,8 +85,18 @@
},
"weaknesses": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1720",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-06-20T15:15:10.267",
"lastModified": "2023-05-03T12:15:24.930",
"vulnStatus": "Modified",
"lastModified": "2023-06-27T15:57:54.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -279,7 +279,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202305-16",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT213443",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1778",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2022-09-14T18:15:09.953",
"lastModified": "2022-10-05T13:45:56.650",
"lastModified": "2023-06-27T15:47:06.047",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-120"
"value": "CWE-119"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1794",
"sourceIdentifier": "info@cert.vde.com",
"published": "2022-07-11T11:15:08.047",
"lastModified": "2022-09-23T16:29:48.687",
"lastModified": "2023-06-27T15:56:43.407",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -85,8 +85,18 @@
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
},
{
"source": "info@cert.vde.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1922",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-07-19T20:15:10.907",
"lastModified": "2022-10-26T13:44:48.710",
"lastModified": "2023-06-27T15:54:21.557",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-190"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1923",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-07-19T20:15:10.967",
"lastModified": "2022-10-26T13:45:13.087",
"lastModified": "2023-06-27T15:51:28.127",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-190"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1924",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-07-19T20:15:11.027",
"lastModified": "2022-10-26T13:45:19.277",
"lastModified": "2023-06-27T15:51:15.940",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-190"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1925",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-07-19T20:15:11.080",
"lastModified": "2022-10-26T13:45:22.827",
"lastModified": "2023-06-27T15:50:42.127",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -46,10 +46,6 @@
{
"lang": "en",
"value": "CWE-190"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1941",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2022-09-22T15:15:09.203",
"lastModified": "2023-04-18T09:15:08.357",
"vulnStatus": "Modified",
"lastModified": "2023-06-27T15:45:37.350",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "NVD-CWE-Other"
}
]
},
@ -131,6 +131,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@ -139,6 +144,21 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
@ -166,7 +186,10 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html",
"source": "cve-coordination@google.com"
"source": "cve-coordination@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBAUKJQL6O4TIWYBENORSY5P43TVB4M3/",
@ -175,6 +198,13 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/",
"source": "cve-coordination@google.com",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1974",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-08-31T16:15:10.007",
"lastModified": "2022-09-07T15:54:56.587",
"lastModified": "2023-06-27T15:47:18.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-416"
"value": "CWE-367"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2023",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-06-20T04:15:09.973",
"lastModified": "2022-06-28T19:20:56.823",
"lastModified": "2023-06-27T15:58:07.787",
"vulnStatus": "Analyzed",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2034",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-08-29T18:15:09.027",
"lastModified": "2022-09-01T06:39:20.070",
"lastModified": "2023-06-27T15:47:37.503",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,18 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23488",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-17T01:15:09.293",
"lastModified": "2022-12-22T13:56:57.427",
"lastModified": "2023-06-27T15:11:47.877",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -61,7 +61,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "CWE-863"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23509",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-01-09T14:15:09.980",
"lastModified": "2023-01-13T20:27:04.817",
"lastModified": "2023-06-27T15:13:31.357",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -61,7 +61,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-319"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23523",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-13T08:15:10.140",
"lastModified": "2022-12-15T19:54:38.217",
"lastModified": "2023-06-27T14:59:10.640",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -61,7 +61,7 @@
"description": [
{
"lang": "en",
"value": "CWE-125"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4024",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-12-19T14:15:11.760",
"lastModified": "2022-12-22T20:55:34.393",
"lastModified": "2023-06-27T15:33:42.210",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -48,6 +48,20 @@
"value": "CWE-862"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41158",
"sourceIdentifier": "vuln@krcert.or.kr",
"published": "2022-11-25T19:15:11.867",
"lastModified": "2022-12-01T15:26:35.607",
"lastModified": "2023-06-27T14:58:35.293",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -61,7 +61,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "CWE-22"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41167",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:16.793",
"lastModified": "2022-10-12T20:02:39.437",
"lastModified": "2023-06-27T15:55:04.977",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41172",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:17.817",
"lastModified": "2022-10-12T19:58:32.127",
"lastModified": "2023-06-27T15:22:01.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41175",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:18.487",
"lastModified": "2022-10-12T19:57:09.860",
"lastModified": "2023-06-27T15:22:05.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -46,6 +46,10 @@
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41177",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:18.857",
"lastModified": "2022-10-12T19:56:03.707",
"lastModified": "2023-06-27T15:22:09.450",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41179",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:19.293",
"lastModified": "2022-10-12T20:06:30.897",
"lastModified": "2023-06-27T15:20:47.173",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41180",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:19.523",
"lastModified": "2022-10-12T20:06:19.863",
"lastModified": "2023-06-27T15:20:52.047",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41184",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:20.543",
"lastModified": "2022-10-12T20:05:23.913",
"lastModified": "2023-06-27T15:20:55.047",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41185",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:20.700",
"lastModified": "2022-10-12T20:03:50.313",
"lastModified": "2023-06-27T15:20:59.053",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41186",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:20.927",
"lastModified": "2022-10-12T20:10:47.207",
"lastModified": "2023-06-27T15:17:41.347",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41187",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:21.137",
"lastModified": "2022-10-12T20:20:01.487",
"lastModified": "2023-06-27T15:18:00.647",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -46,6 +46,10 @@
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41189",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:21.543",
"lastModified": "2022-10-12T20:20:23.327",
"lastModified": "2023-06-27T15:18:06.620",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41190",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:21.840",
"lastModified": "2022-10-12T20:20:33.290",
"lastModified": "2023-06-27T15:18:11.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41191",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:22.307",
"lastModified": "2022-10-12T20:20:42.133",
"lastModified": "2023-06-27T15:22:14.090",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41193",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:23.213",
"lastModified": "2022-10-12T20:17:59.657",
"lastModified": "2023-06-27T15:30:59.420",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41195",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:24.100",
"lastModified": "2022-10-12T20:18:23.577",
"lastModified": "2023-06-27T15:31:08.927",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41196",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:24.520",
"lastModified": "2022-10-12T20:18:38.893",
"lastModified": "2023-06-27T15:31:19.807",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41198",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:25.433",
"lastModified": "2022-10-12T20:18:57.533",
"lastModified": "2023-06-27T15:31:27.230",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41199",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:25.923",
"lastModified": "2022-10-12T20:19:08.193",
"lastModified": "2023-06-27T15:22:33.103",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41200",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:26.097",
"lastModified": "2022-10-12T20:17:25.287",
"lastModified": "2023-06-27T15:22:36.767",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41201",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:26.203",
"lastModified": "2022-10-12T20:17:07.460",
"lastModified": "2023-06-27T15:22:47.807",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -46,6 +46,10 @@
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41202",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:26.303",
"lastModified": "2022-10-12T20:16:37.280",
"lastModified": "2023-06-27T15:22:55.293",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -46,6 +46,10 @@
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41211",
"sourceIdentifier": "cna@sap.com",
"published": "2022-11-08T22:15:18.623",
"lastModified": "2022-12-08T22:49:30.647",
"lastModified": "2023-06-27T14:06:08.953",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -59,6 +59,10 @@
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41230",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.217",
"lastModified": "2022-09-22T15:08:00.500",
"lastModified": "2023-06-27T14:39:11.823",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,18 @@
},
"weaknesses": [
{
"source": "jenkinsci-cert@googlegroups.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "jenkinsci-cert@googlegroups.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41255",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.683",
"lastModified": "2022-09-22T18:47:18.540",
"lastModified": "2023-06-27T14:39:25.127",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,18 @@
},
"weaknesses": [
{
"source": "jenkinsci-cert@googlegroups.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
},
{
"source": "jenkinsci-cert@googlegroups.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41716",
"sourceIdentifier": "security@golang.org",
"published": "2022-11-02T16:15:11.150",
"lastModified": "2022-11-04T13:16:13.183",
"lastModified": "2023-06-27T14:39:47.540",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-74"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41858",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-01-17T18:15:11.140",
"lastModified": "2023-02-23T19:15:11.400",
"vulnStatus": "Modified",
"lastModified": "2023-06-27T15:14:40.373",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -36,8 +36,18 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -56,8 +66,76 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.18",
"matchCriteriaId": "FE93544F-B946-47CF-9697-FBF3484FCB92"
"versionStartIncluding": "2.6.12.1",
"versionEndExcluding": "4.9.311",
"matchCriteriaId": "1B1D4B25-439B-4B58-9DCD-5EFCCA3B3044"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.0",
"versionEndExcluding": "4.14.276",
"matchCriteriaId": "96C58C8B-5A45-438A-9404-355E1BDC721B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.0",
"versionEndExcluding": "4.19.239",
"matchCriteriaId": "54574198-19C7-4027-808B-59EAED63DA16"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.0",
"versionEndExcluding": "5.4.190",
"matchCriteriaId": "0C6AE903-5265-4FC0-9341-D962BD3821C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.0",
"versionEndExcluding": "5.10.112",
"matchCriteriaId": "195C1389-A37F-4A44-AEA6-3EBBE89D363F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.0",
"versionEndExcluding": "5.15.35",
"matchCriteriaId": "E1379333-FB4C-49F1-AEC6-D395BB10C397"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.17.0",
"versionEndExcluding": "5.17.4",
"matchCriteriaId": "F4190EB3-39F4-4DFA-A11A-DE283D1BF94D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*",
"matchCriteriaId": "6F62EECE-8FB1-4D57-85D8-CB9E23CF313C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0AB349B2-3F78-4197-882B-90ADB3BF645A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6AC88830-A9BC-4607-B572-A4B502FC9FD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"matchCriteriaId": "476CB3A5-D022-4F13-AAEF-CB6A5785516A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8CFD5CDD-1709-44C7-82BD-BAFDC46990D6"
},
{
"vulnerable": true,
@ -67,6 +145,41 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*",
"matchCriteriaId": "27227B35-932A-4035-B39F-6A455753C0D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*",
"matchCriteriaId": "489D20B9-166F-423D-8C48-A23D3026E33B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*",
"matchCriteriaId": "A4AD592C-222D-4C6F-B176-8145A1A5AFEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*",
"matchCriteriaId": "8603654B-A8A9-4DEB-B0DD-C82E1C885749"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*",
"matchCriteriaId": "C855C933-F271-45E6-8E85-8D7CF2EF1BE6"
}
]
}
]
}
],
"references": [
@ -80,7 +193,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230223-0006/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41877",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-11-16T20:15:10.507",
"lastModified": "2023-01-25T19:56:41.633",
"lastModified": "2023-06-27T14:18:53.020",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,22 +56,22 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-1284"
}
]
},
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
"value": "CWE-119"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41902",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-06T22:15:10.513",
"lastModified": "2022-12-08T02:56:50.997",
"lastModified": "2023-06-27T14:58:54.877",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41918",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-11-15T23:15:28.283",
"lastModified": "2022-12-12T19:43:03.753",
"lastModified": "2023-06-27T14:06:48.647",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -61,7 +61,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41924",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-11-23T19:15:12.400",
"lastModified": "2022-12-01T15:45:47.270",
"lastModified": "2023-06-27T14:18:59.750",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -63,7 +63,7 @@
"description": [
{
"lang": "en",
"value": "CWE-352"
"value": "CWE-346"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41934",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-11-23T20:15:10.097",
"lastModified": "2022-11-30T17:30:12.047",
"lastModified": "2023-06-27T14:39:58.070",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41945",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-11-21T23:15:10.047",
"lastModified": "2023-03-01T18:03:15.677",
"lastModified": "2023-06-27T14:01:24.990",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,22 +56,22 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "NVD-CWE-Other"
}
]
},
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
"value": "CWE-94"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41966",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-28T00:15:14.237",
"lastModified": "2023-01-06T17:05:31.553",
"lastModified": "2023-06-27T14:04:14.103",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-674"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4102",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-09T23:15:27.247",
"lastModified": "2023-01-13T06:51:04.363",
"lastModified": "2023-06-27T15:35:04.127",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -39,6 +39,10 @@
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4103",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-09T23:15:27.330",
"lastModified": "2023-01-13T19:32:27.147",
"lastModified": "2023-06-27T15:54:40.787",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -48,6 +48,20 @@
"value": "CWE-862"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2022-4115",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.077",
"lastModified": "2023-06-27T14:15:10.077",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Editorial Calendar WordPress plugin through 3.7.12 does not sanitise and escape its settings, allowing users with roles as low as contributor to inject arbitrary web scripts in the plugin admin panel, enabling a Stored Cross-Site Scripting vulnerability targeting higher privileged users."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/2b5071e1-9532-4a6c-9da4-d07932474ca4",
"source": "contact@wpscan.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4123",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-12-08T16:15:14.937",
"lastModified": "2022-12-12T15:46:25.110",
"lastModified": "2023-06-27T14:59:05.893",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -36,8 +36,18 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4124",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-12-19T14:15:12.513",
"lastModified": "2022-12-22T22:04:28.780",
"lastModified": "2023-06-27T15:12:02.703",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -48,6 +48,20 @@
"value": "CWE-862"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42377",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.340",
"lastModified": "2023-02-02T14:13:48.480",
"lastModified": "2023-06-27T14:04:27.247",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -63,7 +63,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4223",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-12-13T16:15:26.277",
"lastModified": "2022-12-19T16:59:10.927",
"lastModified": "2023-06-27T14:04:21.833",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -36,8 +36,18 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46850",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-06-19T13:15:09.493",
"lastModified": "2023-06-20T07:12:55.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-27T14:47:29.597",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_media_replace_project:easy_media_replace:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.1.3",
"matchCriteriaId": "8115B0DB-9FEB-4CFB-98D0-6D2C1721D086"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/easy-media-replace/wordpress-easy-media-replace-plugin-0-1-3-arbitrary-file-deletion?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-0588",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.150",
"lastModified": "2023-06-27T14:15:10.150",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Catalyst Connect Zoho CRM Client Portal WordPress plugin before 2.1.0 does not sanitize and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high-privilege users such as admin."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/84be272e-0891-461c-91ad-496b64f92f8f",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-0873",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.213",
"lastModified": "2023-06-27T14:15:10.213",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Kanban Boards for WordPress plugin before 2.5.21 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/8816d4c1-9e8e-4b6f-a36a-10a98a7ccfcd",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-1166",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.277",
"lastModified": "2023-06-27T14:15:10.277",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The USM-Premium WordPress plugin before 16.3 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup)."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/825eccf9-f351-4a5b-b238-9969141b94fa",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-1891",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.340",
"lastModified": "2023-06-27T14:15:10.340",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Accordion & FAQ WordPress plugin before 1.9.9 does not escape various generated URLs, before outputting them in attributes when some notices are displayed, leading to Reflected Cross-Site Scripting"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/4e5d993f-cc20-4b5f-b4c8-c13004151828",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2032",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.417",
"lastModified": "2023-06-27T14:15:10.417",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Custom 404 Pro WordPress plugin before 3.8.1 does not properly sanitize database inputs, leading to multiple SQL Injection vulnerabilities."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/17acde5d-44ea-4e77-8670-260d22e28ffe",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2068",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.477",
"lastModified": "2023-06-27T14:15:10.477",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The File Manager Advanced Shortcode WordPress plugin through 2.3.2 does not adequately prevent uploading files with disallowed MIME types when using the shortcode. This leads to RCE in cases where the allowed MIME type list does not include PHP files. In the worst case, this is available to unauthenticated users."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/58f72953-56d2-4d86-a49b-311b5fc58056",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2178",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.540",
"lastModified": "2023-06-27T14:15:10.540",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Aajoda Testimonials WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/e84b71f9-4208-4efb-90e8-1c778e7d2ebb",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2326",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.600",
"lastModified": "2023-06-27T14:15:10.600",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Gravity Forms Google Sheet Connector WordPress plugin before 1.3.5, gsheetconnector-gravityforms-pro WordPress plugin through 1.3.5 does not have CSRF check when updating its Access Code, which could allow attackers to make logged in admin change the access code to an arbitrary one via a CSRF attack"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/f922695a-b803-4edf-aadc-80c79d99bebb",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2482",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.663",
"lastModified": "2023-06-27T14:15:10.663",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Responsive CSS EDITOR WordPress plugin through 1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high-privilege users such as admin."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/c0f73781-be7e-482e-91de-ad7991ad4bd5",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2580",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.730",
"lastModified": "2023-06-27T14:15:10.730",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The AI Engine WordPress plugin before 1.6.83 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup)."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/7ee1efb1-9969-40b2-8ab2-ea427091bbd8",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2592",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.790",
"lastModified": "2023-06-27T14:15:10.790",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The FormCraft WordPress plugin before 3.9.7 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/d4298960-eaba-4185-a730-3e621d9680e1",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-2601",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.847",
"lastModified": "2023-06-27T14:15:10.847",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The wpbrutalai WordPress plugin before 2.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin via CSRF."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/57769468-3802-4985-bf5e-44ec1d59f5fd",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2605",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.910",
"lastModified": "2023-06-27T14:15:10.910",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The wpbrutalai WordPress plugin before 2.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a logged in high privilege users such as admin."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/372cb940-71ba-4d19-b35a-ab15f8c2fdeb",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2623",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.967",
"lastModified": "2023-06-27T14:15:10.967",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The KiviCare WordPress plugin before 3.2.1 does not restrict the information returned in a response and returns all user data, allowing low privilege users such as subscriber to retrieve sensitive information such as the user email and hashed password of other users"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/85cc39b1-416f-4d23-84c1-fdcbffb0dda0",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2624",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.030",
"lastModified": "2023-06-27T14:15:11.030",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The KiviCare WordPress plugin before 3.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrator"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/dc3a841d-a95b-462e-be4b-acaa44e77264",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-2627",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.090",
"lastModified": "2023-06-27T14:15:11.090",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The KiviCare WordPress plugin before 3.2.1 does not have proper CSRF and authorisation checks in various AJAX actions, allowing any authenticated users, such as subscriber to call them. Attacks include but are not limited to: Add arbitrary Clinic Admin/Doctors/etc and update plugin's settings"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/162d0029-2adc-4925-9985-1d5d672dbe75",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2628",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.153",
"lastModified": "2023-06-27T14:15:11.153",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The KiviCare WordPress plugin before 3.2.1 does not have CSRF checks (either flawed or missing completely) in various AJAX actions, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks. This includes, but is not limited to: Delete arbitrary appointments/medical records/etc, create/update various users (patients, doctors etc)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/e0741e2c-c529-4815-8744-16e01cdb0aed",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2711",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.267",
"lastModified": "2023-06-27T14:15:11.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Ultimate Product Catalog WordPress plugin before 5.2.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/71c5b5b5-8694-4738-8e4b-8670a8d21c86",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2743",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.373",
"lastModified": "2023-06-27T14:15:11.373",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The ERP WordPress plugin before 1.12.4 does not sanitise and escape the employee_name parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/517c6aa4-a56d-4f13-b370-7c864dd9c7db",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2744",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.433",
"lastModified": "2023-06-27T14:15:11.433",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/435da8a1-9955-46d7-a508-b5738259e731",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2795",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.493",
"lastModified": "2023-06-27T14:15:11.493",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The CodeColorer WordPress plugin before 0.10.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/2d6ecd21-3dd4-423d-80e7-277c45080a9f",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-2818",
"sourceIdentifier": "security@proofpoint.com",
"published": "2023-06-27T15:15:10.350",
"lastModified": "2023-06-27T15:15:10.350",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An insecure filesystem permission in the Insider Threat Management Agent for Windows enables local unprivileged users to disrupt agent monitoring. All versions prior to 7.14.3 are affected. Agents for MacOS and Linux and Cloud are unaffected."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@proofpoint.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@proofpoint.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"references": [
{
"url": "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-005",
"source": "security@proofpoint.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2842",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.567",
"lastModified": "2023-06-27T14:15:11.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP Inventory Manager WordPress plugin before 2.1.0.14 does not have CSRF checks, which could allow attackers to make logged-in admins delete Inventory Items via a CSRF attack"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/0357ecc7-56f5-4843-a928-bf2d3ce75596",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2877",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.633",
"lastModified": "2023-06-27T14:15:11.633",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Formidable Forms WordPress plugin before 6.3.1 does not adequately authorize the user or validate the plugin URL in its functionality for installing add-ons. This allows a user with a role as low as Subscriber to install and activate arbitrary plugins of arbitrary versions from the WordPress.org plugin repository onto the site, leading to Remote Code Execution."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/33765da5-c56e-42c1-83dd-fcaad976b402",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-2996",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.723",
"lastModified": "2023-06-27T14:15:11.723",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Jetpack WordPress plugin before 12.1.1 does not validate uploaded files, allowing users with author roles or above to manipulate existing files on the site, deleting arbitrary files, and in rare cases achieve Remote Code Execution via phar deserialization."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://jetpack.com/blog/jetpack-12-1-1-critical-security-update/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/52d221bd-ae42-435d-a90a-60a5ae530663",
"source": "contact@wpscan.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34453",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-06-15T17:15:09.790",
"lastModified": "2023-06-15T20:46:39.603",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-27T15:59:58.483",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,22 +66,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xerial:snappy-java:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.10.1",
"matchCriteriaId": "11C2E65C-E284-478A-8D65-351AF645472B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/BitShuffle.java",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-34613",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.050",
"lastModified": "2023-06-14T15:30:53.640",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-27T14:53:34.677",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered sojo thru 1.1.1 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sojo_project:sojo:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.1.1",
"matchCriteriaId": "5FFA3DAE-DCCF-4E81-A7F5-AD23CDC33A60"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/maddingo/sojo/issues/15",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-34614",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.100",
"lastModified": "2023-06-14T15:30:53.640",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-27T15:03:32.087",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered jmarsden/jsonij thru 0.5.2 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jsonij_project:jsonij:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.2",
"matchCriteriaId": "BD69A8B5-1D0D-4430-B597-32A8781F7155"
}
]
}
]
}
],
"references": [
{
"url": "https://bitbucket.org/jmarsden/jsonij/issues/7/stack-overflow-error-caused-by-jsonij",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,77 @@
"id": "CVE-2023-34615",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.143",
"lastModified": "2023-06-14T15:30:53.640",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-27T15:34:28.360",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered JSONUtil thru 5.0 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jsonutil_project:jsonutil:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.0",
"matchCriteriaId": "4E667EB9-E23A-472F-8CB9-9CD3624CD23E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/billdavidson/JSONUtil/issues/10",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

Some files were not shown because too many files have changed in this diff Show More