mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2023-05-12T14:00:24.295716+00:00
This commit is contained in:
parent
edc1e12c78
commit
c95412b6ba
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2013-0169",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2013-02-08T19:55:01.030",
|
||||
"lastModified": "2019-10-09T23:06:34.343",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-05-12T12:58:44.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"evaluatorComment": "Per http://www.openssl.org/news/vulnerabilities.html:\nFixed in OpenSSL 1.0.1d (Affected 1.0.1c, 1.0.1b, 1.0.1a, 1.0.1) \nFixed in OpenSSL 1.0.0k (Affected 1.0.0j, 1.0.0i, 1.0.0g, 1.0.0f, 1.0.0e, 1.0.0d, 1.0.0c, 1.0.0b, 1.0.0a, 1.0.0) \nFixed in OpenSSL 0.9.8y (Affected 0.9.8x, 0.9.8w, 0.9.8v, 0.9.8u, 0.9.8t, 0.9.8s, 0.9.8r, 0.9.8q, 0.9.8p, 0.9.8o, 0.9.8n, 0.9.8m, 0.9.8l, 0.9.8k, 0.9.8j, 0.9.8i, 0.9.8h, 0.9.8g, 0.9.8f, 0.9.8d, 0.9.8c, 0.9.8b, 0.9.8a, 0.9.8)\n\nAffected users should upgrade to OpenSSL 1.0.1e, 1.0.0k or 0.9.8y\n(The fix in 1.0.1d wasn't complete, so please use 1.0.1e or later)",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -94,23 +94,238 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A2B679E-F0CC-4BE5-BCA7-007E5089CE65"
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C58642D-8504-4D3B-A411-96B83CFCD05D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A6505E4-8E6A-4888-8B9C-2B2C10546CB6"
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "603BED29-3B3F-49AD-A518-E68B40AE8484"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "662D4C81-DD97-4A36-8F15-CCE6ADA6456E"
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F03670F-559C-433D-8AE8-A3C16F05E1D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CA81243-2FC7-481B-AFD8-067E3EC9DF77"
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A294535-7190-4C33-910D-0520F575D800"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52A6300A-98F2-4E5A-909E-895A6C5B1D04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2280FB93-81A0-4BF4-AD7E-C9EAD277B379"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E42E405-91ED-4F41-A2EE-CECB27EB4951"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11BCE518-1A35-44DE-9B40-B89E7637F830"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46D0BB1F-FA76-4185-ACD4-587DFB24CFF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D27FDDD5-083F-4A83-836F-BDCEB94894FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30BF0C2F-BF35-41B8-BC6A-F2DACE6A9A32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE05CDF7-1C43-46BF-9A7E-56B31BC1C837"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A520D505-7BDC-4E82-8A43-7C50AEE2B222"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5ADF3C32-6663-4003-B7D6-CE3D02AFF45E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F15C4440-6283-433E-998E-856DA7ED4DB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C729FF50-6E41-4CEB-888A-E0FBD69B7897"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB0AB341-46CE-4851-899A-B09C81A9792E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68EF7AC1-0179-4E10-89DD-5DA33682B3F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "243726CF-F79A-4487-8807-FFA0AC86760B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5DECF6EC-B787-4CBA-936C-527864B504DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C70C7D7-4E28-49D9-A007-EB186E85E5B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "99B2B1A1-C3E5-4A32-8F5A-4BA8664E7537"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F57C81C-446F-462C-BB64-65F87D1AA28F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CFFA025-08DC-4AEF-AAE3-B20ECCB0946E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ACBA03CE-2EF2-4C51-B796-54C65C3CFBCD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "085241E5-F958-43DD-AB0A-35EAF6954CB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20CD7414-1D66-4311-90FB-5D53C0C22D82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DCB646B-3F17-427D-AE89-039FCA1F6D7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA2AB84A-05D5-4091-B225-7762A73D45BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A5A15F9-5047-4BB9-9B3E-A00998B6E7C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11A0378E-0D41-4FE0-8DAF-A01B66D814DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "942C51A3-87AC-4DB5-BAB9-3771A19C472A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C34819D3-615F-4CEE-BEAA-CE48BC2E53BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D97A141E-5FC0-4B79-ABAA-82F6DE857625"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D32EAE02-B313-47AC-A1A3-BBF58A692E02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81EA5E3B-7EA9-45A4-9B69-2DD96471A731"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "27DED59D-C293-4D36-B194-B1645CD798C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC3ADCB9-C4B7-4D30-932B-415C317870F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06FB52F8-8702-4795-BA47-28A1D007952F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FDD48A5-9956-4AE6-9899-40D0830719FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "875DAD00-C396-4F45-8C39-843686D5C3DA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F45FA1E6-D848-482B-BB3F-5B02E837EE60"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94A59C56-6A9B-4630-ACBD-45359451120D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "795C1133-BF5E-4B07-A448-13EFAFEED9B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DF20B7CE-1CD3-4D1E-9C5F-E9594A5135D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3206CF31-0EF2-4351-A077-1F8935965492"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2E1A163-7376-41C9-A0FF-C8C3B192B73A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,23 +2,81 @@
|
||||
"id": "CVE-2020-22334",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-08T14:15:10.357",
|
||||
"lastModified": "2023-05-08T14:17:28.107",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-12T12:49:54.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Request Forgery (CSRF) vulnerability in beescms v4 allows attackers to delete the administrator account via crafted request to /admin/admin_admin.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:beescms:beescms:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25C27AEE-DD4E-4006-8DD1-E4A6160F4D43"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/source-trace/beescms",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/source-trace/beescms/issues/5",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-42008",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-10-05T00:15:07.413",
|
||||
"lastModified": "2022-03-29T19:08:47.827",
|
||||
"lastModified": "2023-05-12T12:59:16.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -86,8 +86,51 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.12",
|
||||
"versionEndExcluding": "4.4.282",
|
||||
"matchCriteriaId": "57902C44-F9DC-4C23-94A4-B32173CCA0FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.281",
|
||||
"matchCriteriaId": "286C2303-8862-4B89-BF52-0EB83C7C067C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.245",
|
||||
"matchCriteriaId": "05DE70B5-762A-4042-8465-8690F02688FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.205",
|
||||
"matchCriteriaId": "5DFB089B-C0CD-422B-9182-497E5451AD10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.143",
|
||||
"matchCriteriaId": "92D4E689-F642-442E-941E-ED513FDAB50E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.61",
|
||||
"matchCriteriaId": "8231A299-42F7-4FF4-88F2-3586A0334A43"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.13.13",
|
||||
"matchCriteriaId": "AA4975E4-6EC3-4531-BCA1-04042F9C9333"
|
||||
"matchCriteriaId": "8679FC92-58C1-40E5-ABCD-9F513BDFE368"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0108",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2022-02-12T00:15:07.660",
|
||||
"lastModified": "2023-05-05T17:15:09.343",
|
||||
"lastModified": "2023-05-12T12:15:09.067",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -141,6 +141,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00011.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0492",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-03-03T19:15:08.633",
|
||||
"lastModified": "2022-10-19T17:33:19.877",
|
||||
"lastModified": "2023-05-12T12:59:46.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,8 +95,51 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.17",
|
||||
"matchCriteriaId": "A37A8EE9-3F14-4C7A-A882-DA8A6AD1897C"
|
||||
"versionStartIncluding": "2.6.24",
|
||||
"versionEndExcluding": "4.9.301",
|
||||
"matchCriteriaId": "006C09FF-C563-403E-8723-2A252C409D82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.266",
|
||||
"matchCriteriaId": "C53477E7-1AB3-4CCB-BA3A-8CA6D288B41B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.229",
|
||||
"matchCriteriaId": "E67EAACB-63BB-41E7-9FE0-EC45ECD8CFD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.177",
|
||||
"matchCriteriaId": "B42832A3-1D9B-4BE0-8D4C-3AF681B52D98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.97",
|
||||
"matchCriteriaId": "FB2BE440-BF07-4C49-9A0C-A63E4FA103A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.20",
|
||||
"matchCriteriaId": "C68FC5B4-CC13-45E9-8050-EF9025F7A9B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.6",
|
||||
"matchCriteriaId": "6739D89E-32C3-479D-B5F6-6865C5061FA5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-24122",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-01-29T22:15:07.487",
|
||||
"lastModified": "2022-04-01T14:16:20.417",
|
||||
"lastModified": "2023-05-12T13:28:10.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -87,8 +87,15 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.14",
|
||||
"versionEndIncluding": "5.16.4",
|
||||
"matchCriteriaId": "E05C7D99-9B29-4197-BF9D-B883C07C04A6"
|
||||
"versionEndExcluding": "5.15.19",
|
||||
"matchCriteriaId": "9DAE4918-27E2-4C50-A1A7-270051C4A793"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.5",
|
||||
"matchCriteriaId": "1AD9E77E-B27E-450C-8FD8-B64EC5FB002D"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-35256",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2022-12-05T22:15:10.570",
|
||||
"lastModified": "2023-03-01T15:04:25.037",
|
||||
"lastModified": "2023-05-12T13:30:33.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -74,8 +74,8 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "14.15.0",
|
||||
"versionEndIncluding": "14.20.1",
|
||||
"matchCriteriaId": "A545DA7E-476B-4936-8CDA-4C4F372C42D6"
|
||||
"versionEndExcluding": "14.20.1",
|
||||
"matchCriteriaId": "1D907C43-56F3-4FB8-8F20-C90C65EE5A08"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-3545",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2022-10-17T12:15:11.133",
|
||||
"lastModified": "2023-05-03T14:15:13.337",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-05-12T13:28:26.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -85,8 +85,37 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.0",
|
||||
"matchCriteriaId": "87B81C9D-7173-4FFB-97BC-9C41AB20A53C"
|
||||
"versionStartIncluding": "4.11",
|
||||
"versionEndExcluding": "4.14.303",
|
||||
"matchCriteriaId": "315F99DD-5A8B-4E68-9646-8DB2A62D4B96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.270",
|
||||
"matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.228",
|
||||
"matchCriteriaId": "B4C9B19E-CA7E-4B02-ADDD-4D572867804E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.160",
|
||||
"matchCriteriaId": "C4AE0903-0CA6-451B-AA7C-0F4B588FFB8A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.84",
|
||||
"matchCriteriaId": "1926D676-6FAF-4772-8DD6-796AFC3FC120"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -267,7 +296,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221223-0003/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4139",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-01-27T18:15:15.740",
|
||||
"lastModified": "2023-03-09T19:15:10.727",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-05-12T13:28:40.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,8 +66,30 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.1",
|
||||
"matchCriteriaId": "9064B383-DD48-40A2-8947-F5BA6E6B6713"
|
||||
"versionStartIncluding": "5.4",
|
||||
"versionEndExcluding": "5.4.226",
|
||||
"matchCriteriaId": "092FDA34-E818-4950-A40E-76DD0BC7B9A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.157",
|
||||
"matchCriteriaId": "5EAF291E-0C2B-409D-9D82-59F0C0B67CAB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.81",
|
||||
"matchCriteriaId": "899FBA32-27B2-4660-BC94-C43ED4349EB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.0.11",
|
||||
"matchCriteriaId": "BA01D181-8E71-42E1-ACF4-7A5B65006EC8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -121,7 +143,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230309-0004/",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2022/11/30/1",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4696",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2023-01-11T13:15:09.307",
|
||||
"lastModified": "2023-01-19T13:24:23.810",
|
||||
"lastModified": "2023-05-12T13:30:58.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,8 +85,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.7:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "83CE3BF3-F57D-4AF6-AD37-D29434787772"
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10",
|
||||
"versionEndExcluding": "5.12",
|
||||
"matchCriteriaId": "8919F320-7EC7-47EF-AFA9-126CDF30AB7B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47518",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-18T06:15:09.300",
|
||||
"lastModified": "2023-01-30T15:23:03.297",
|
||||
"lastModified": "2023-05-12T13:31:11.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -57,8 +57,23 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "5.10.157",
|
||||
"matchCriteriaId": "B6EEDAF9-68D3-4D7D-9C7A-722C1EAEDFDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.81",
|
||||
"matchCriteriaId": "899FBA32-27B2-4660-BC94-C43ED4349EB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.0.11",
|
||||
"matchCriteriaId": "250F7A1B-7491-4CCA-BD47-B4E4FD26603E"
|
||||
"matchCriteriaId": "BA01D181-8E71-42E1-ACF4-7A5B65006EC8"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47519",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-18T06:15:09.417",
|
||||
"lastModified": "2023-01-30T15:23:07.253",
|
||||
"lastModified": "2023-05-12T13:31:33.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -57,8 +57,23 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "5.10.157",
|
||||
"matchCriteriaId": "B6EEDAF9-68D3-4D7D-9C7A-722C1EAEDFDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.81",
|
||||
"matchCriteriaId": "899FBA32-27B2-4660-BC94-C43ED4349EB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.0.11",
|
||||
"matchCriteriaId": "250F7A1B-7491-4CCA-BD47-B4E4FD26603E"
|
||||
"matchCriteriaId": "BA01D181-8E71-42E1-ACF4-7A5B65006EC8"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,19 +2,161 @@
|
||||
"id": "CVE-2022-48383",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-05-09T02:15:11.737",
|
||||
"lastModified": "2023-05-09T12:46:35.530",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-12T12:54:18.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": ".In srtd service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761",
|
||||
"source": "security@unisoc.com"
|
||||
"source": "security@unisoc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,15 +2,38 @@
|
||||
"id": "CVE-2023-0522",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-08T14:15:11.417",
|
||||
"lastModified": "2023-05-08T14:17:23.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-12T13:33:51.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Enable/Disable Auto Login when Register WordPress plugin through 1.1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
@ -23,10 +46,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:enable\\/disable_auto_login_when_register_project:enable\\/disable_auto_login_when_register:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1.0",
|
||||
"matchCriteriaId": "15419627-DF51-4CB0-8DAD-D770FEC75A0F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/c7984bfb-86a3-4530-90ae-17ab39af1c54",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2023/CVE-2023-234xx/CVE-2023-23444.json
Normal file
51
CVE-2023/CVE-2023-234xx/CVE-2023-23444.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2023-23444",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2023-05-12T13:15:09.350",
|
||||
"lastModified": "2023-05-12T13:15:09.350",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authentication for Critical Function in SICK Flexi Classic and Flexi Soft Gateways with Partnumbers 1042193, 1042964, 1044078, 1044072, 1044073, 1044074, 1099830, 1099832, 1127717, 1069070, 1112296, 1051432, 1102420, 1127487, 1121596, 1121597 allows an unauthenticated remote attacker to influence the availability of the device by changing the IP settings of the device via broadcasted UDP packets."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0003.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0003.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25309",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-11T18:15:12.360",
|
||||
"lastModified": "2023-05-11T18:15:12.360",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-12T13:15:09.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -20,6 +20,10 @@
|
||||
"url": "http://rollout-ui.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://cxsecurity.com/issue/WLB-2023050012",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/172185/Rollout-UI-0.5-Cross-Site-Scripting.html",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26605",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-26T23:15:10.827",
|
||||
"lastModified": "2023-03-16T16:15:12.247",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-05-12T13:31:55.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,24 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.0.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C41207B8-D94A-4714-B1E0-66CEFF00FEE0"
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15.75",
|
||||
"versionEndExcluding": "5.15.81",
|
||||
"matchCriteriaId": "C15A1592-2D11-489C-A208-5474834B2E80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.19.17",
|
||||
"versionEndExcluding": "6.0.0",
|
||||
"matchCriteriaId": "25175142-441A-4526-B1D9-18913C052F3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.3",
|
||||
"versionEndExcluding": "6.0.11",
|
||||
"matchCriteriaId": "73FC69CE-E4BD-4315-AC3C-42B1AD292E2A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,7 +89,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230316-0010/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
84
CVE-2023/CVE-2023-26xx/CVE-2023-2682.json
Normal file
84
CVE-2023/CVE-2023-26xx/CVE-2023-2682.json
Normal file
@ -0,0 +1,84 @@
|
||||
{
|
||||
"id": "CVE-2023-2682",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-12T13:15:09.477",
|
||||
"lastModified": "2023-05-12T13:15:09.477",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Caton Live up to 2023-04-26 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/ping.cgi of the component Mini_HTTPD. The manipulation of the argument address with the input ;id;uname${IFS}-a leads to command injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-228911. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.228911",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.228911",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27932",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-05-08T20:15:17.247",
|
||||
"lastModified": "2023-05-09T12:47:05.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-12T12:15:09.190",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00011.html",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213670",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27954",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-05-08T20:15:18.267",
|
||||
"lastModified": "2023-05-09T12:47:05.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-12T12:15:09.340",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00011.html",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213670",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28205",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-04-10T19:15:07.237",
|
||||
"lastModified": "2023-05-08T20:15:19.807",
|
||||
"lastModified": "2023-05-12T12:15:09.467",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-04-10",
|
||||
"cisaActionDue": "2023-05-01",
|
||||
@ -101,6 +101,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00011.html",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213720",
|
||||
"source": "product-security@apple.com",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-30024",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T13:15:13.920",
|
||||
"lastModified": "2023-05-10T16:12:16.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-12T12:15:09.623",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permissions vulnerability found in MagicJack A921 USB Phone Jack Rev 3.0 v.1.4 allows a physically proximate attacker to escalate privileges and gain access to sensitive information via the NAND flash memory."
|
||||
"value": "The MagicJack device, a VoIP solution for internet phone calls, contains a hidden NAND flash memory partition allowing unauthorized read/write access. Attackers can exploit this by replacing the original software with a malicious version, leading to ransomware deployment on the host computer. Affected devices have firmware versions prior to magicJack A921 USB Phone Jack Rev 3.0 V1.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
20
CVE-2023/CVE-2023-319xx/CVE-2023-31985.json
Normal file
20
CVE-2023/CVE-2023-319xx/CVE-2023-31985.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-31985",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-12T12:15:09.800",
|
||||
"lastModified": "2023-05-12T12:15:09.800",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Command Injection vulnerability in Edimax Wireless Router N300 Firmware BR-6428NS_v4 allows attacker to execute arbitrary code via the formAccept function in /bin/webs without any limitations."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/3/Readme.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
48
README.md
48
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-05-12T12:00:23.808260+00:00
|
||||
2023-05-12T14:00:24.295716+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-05-12T11:15:13.133000+00:00
|
||||
2023-05-12T13:33:51.097000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,34 +29,42 @@ Download and Changelog: [Click](releases/latest)
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
215126
|
||||
215129
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2020-13377](CVE-2020/CVE-2020-133xx/CVE-2020-13377.json) (`2023-05-12T11:15:12.560`)
|
||||
* [CVE-2023-23169](CVE-2023/CVE-2023-231xx/CVE-2023-23169.json) (`2023-05-12T11:15:12.727`)
|
||||
* [CVE-2023-2512](CVE-2023/CVE-2023-25xx/CVE-2023-2512.json) (`2023-05-12T11:15:13.033`)
|
||||
* [CVE-2023-2677](CVE-2023/CVE-2023-26xx/CVE-2023-2677.json) (`2023-05-12T10:15:09.073`)
|
||||
* [CVE-2023-2678](CVE-2023/CVE-2023-26xx/CVE-2023-2678.json) (`2023-05-12T10:15:09.140`)
|
||||
* [CVE-2023-27237](CVE-2023/CVE-2023-272xx/CVE-2023-27237.json) (`2023-05-12T11:15:12.773`)
|
||||
* [CVE-2023-27238](CVE-2023/CVE-2023-272xx/CVE-2023-27238.json) (`2023-05-12T11:15:12.810`)
|
||||
* [CVE-2023-29657](CVE-2023/CVE-2023-296xx/CVE-2023-29657.json) (`2023-05-12T11:15:12.850`)
|
||||
* [CVE-2023-29818](CVE-2023/CVE-2023-298xx/CVE-2023-29818.json) (`2023-05-12T11:15:12.887`)
|
||||
* [CVE-2023-29819](CVE-2023/CVE-2023-298xx/CVE-2023-29819.json) (`2023-05-12T11:15:12.923`)
|
||||
* [CVE-2023-29820](CVE-2023/CVE-2023-298xx/CVE-2023-29820.json) (`2023-05-12T11:15:12.960`)
|
||||
* [CVE-2023-29983](CVE-2023/CVE-2023-299xx/CVE-2023-29983.json) (`2023-05-12T11:15:12.997`)
|
||||
* [CVE-2023-30130](CVE-2023/CVE-2023-301xx/CVE-2023-30130.json) (`2023-05-12T11:15:13.097`)
|
||||
* [CVE-2023-30246](CVE-2023/CVE-2023-302xx/CVE-2023-30246.json) (`2023-05-12T11:15:13.133`)
|
||||
* [CVE-2023-23444](CVE-2023/CVE-2023-234xx/CVE-2023-23444.json) (`2023-05-12T13:15:09.350`)
|
||||
* [CVE-2023-2682](CVE-2023/CVE-2023-26xx/CVE-2023-2682.json) (`2023-05-12T13:15:09.477`)
|
||||
* [CVE-2023-31985](CVE-2023/CVE-2023-319xx/CVE-2023-31985.json) (`2023-05-12T12:15:09.800`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `20`
|
||||
|
||||
* [CVE-2020-24188](CVE-2020/CVE-2020-241xx/CVE-2020-24188.json) (`2023-05-12T11:15:12.613`)
|
||||
* [CVE-2013-0169](CVE-2013/CVE-2013-01xx/CVE-2013-0169.json) (`2023-05-12T12:58:44.970`)
|
||||
* [CVE-2020-22334](CVE-2020/CVE-2020-223xx/CVE-2020-22334.json) (`2023-05-12T12:49:54.587`)
|
||||
* [CVE-2021-42008](CVE-2021/CVE-2021-420xx/CVE-2021-42008.json) (`2023-05-12T12:59:16.287`)
|
||||
* [CVE-2022-0108](CVE-2022/CVE-2022-01xx/CVE-2022-0108.json) (`2023-05-12T12:15:09.067`)
|
||||
* [CVE-2022-0492](CVE-2022/CVE-2022-04xx/CVE-2022-0492.json) (`2023-05-12T12:59:46.603`)
|
||||
* [CVE-2022-24122](CVE-2022/CVE-2022-241xx/CVE-2022-24122.json) (`2023-05-12T13:28:10.820`)
|
||||
* [CVE-2022-35256](CVE-2022/CVE-2022-352xx/CVE-2022-35256.json) (`2023-05-12T13:30:33.190`)
|
||||
* [CVE-2022-3545](CVE-2022/CVE-2022-35xx/CVE-2022-3545.json) (`2023-05-12T13:28:26.433`)
|
||||
* [CVE-2022-4139](CVE-2022/CVE-2022-41xx/CVE-2022-4139.json) (`2023-05-12T13:28:40.100`)
|
||||
* [CVE-2022-4696](CVE-2022/CVE-2022-46xx/CVE-2022-4696.json) (`2023-05-12T13:30:58.023`)
|
||||
* [CVE-2022-47518](CVE-2022/CVE-2022-475xx/CVE-2022-47518.json) (`2023-05-12T13:31:11.263`)
|
||||
* [CVE-2022-47519](CVE-2022/CVE-2022-475xx/CVE-2022-47519.json) (`2023-05-12T13:31:33.517`)
|
||||
* [CVE-2022-48383](CVE-2022/CVE-2022-483xx/CVE-2022-48383.json) (`2023-05-12T12:54:18.963`)
|
||||
* [CVE-2023-0522](CVE-2023/CVE-2023-05xx/CVE-2023-0522.json) (`2023-05-12T13:33:51.097`)
|
||||
* [CVE-2023-25309](CVE-2023/CVE-2023-253xx/CVE-2023-25309.json) (`2023-05-12T13:15:09.427`)
|
||||
* [CVE-2023-26605](CVE-2023/CVE-2023-266xx/CVE-2023-26605.json) (`2023-05-12T13:31:55.560`)
|
||||
* [CVE-2023-27932](CVE-2023/CVE-2023-279xx/CVE-2023-27932.json) (`2023-05-12T12:15:09.190`)
|
||||
* [CVE-2023-27954](CVE-2023/CVE-2023-279xx/CVE-2023-27954.json) (`2023-05-12T12:15:09.340`)
|
||||
* [CVE-2023-28205](CVE-2023/CVE-2023-282xx/CVE-2023-28205.json) (`2023-05-12T12:15:09.467`)
|
||||
* [CVE-2023-30024](CVE-2023/CVE-2023-300xx/CVE-2023-30024.json) (`2023-05-12T12:15:09.623`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user