Auto-Update: 2023-05-24T22:00:26.529692+00:00

This commit is contained in:
cad-safe-bot 2023-05-24 22:00:30 +00:00
parent 976044adff
commit d934bd0f52
60 changed files with 2037 additions and 147 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-20107",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-13T16:15:08.937",
"lastModified": "2023-05-03T11:15:09.227",
"lastModified": "2023-05-24T21:15:09.160",
"vulnStatus": "Modified",
"descriptions": [
{
@ -188,6 +188,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-20907",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-07-13T13:15:10.763",
"lastModified": "2022-07-28T11:16:31.243",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-24T21:15:09.367",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -306,6 +306,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-26116",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-09-27T04:15:11.587",
"lastModified": "2022-06-28T14:11:45.273",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-24T21:15:09.543",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -267,6 +267,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-8492",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-30T19:15:12.103",
"lastModified": "2021-09-16T15:46:26.457",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-24T21:15:09.687",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -260,6 +260,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3177",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-19T06:15:12.967",
"lastModified": "2022-12-06T21:52:52.443",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-24T21:15:09.877",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -253,6 +253,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3733",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-03-10T17:42:59.623",
"lastModified": "2022-10-26T13:35:24.583",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-24T21:15:10.037",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -304,6 +304,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20220407-0001/",
"source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3737",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-03-04T19:15:08.730",
"lastModified": "2023-02-02T17:07:26.440",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-24T21:15:10.180",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -333,6 +333,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"source": "secalert@redhat.com"
},
{
"url": "https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html",
"source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-4189",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-08-24T16:15:09.827",
"lastModified": "2022-12-08T03:57:47.713",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-24T21:15:10.313",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -183,6 +183,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"source": "secalert@redhat.com"
},
{
"url": "https://python-security.readthedocs.io/vuln/ftplib-pasv.html",
"source": "secalert@redhat.com",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-30025",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T21:15:10.450",
"lastModified": "2023-05-24T21:15:10.450",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection in \"/Framewrk/Home.jsp\" file (POST method) in tCredence Analytics iDEAL Wealth and Funds - 1.0 iallows authenticated remote attackers to inject payload via \"v\" parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/fir3storm/c8a013d1231c22e22835566609620afd",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31001",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-05-31T20:15:07.850",
"lastModified": "2022-11-16T20:00:03.037",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-24T21:15:10.540",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -85,7 +85,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
@ -95,7 +95,7 @@
]
},
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@ -169,6 +169,10 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5410",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31002",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-05-31T19:15:07.717",
"lastModified": "2022-11-16T19:58:33.830",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-24T21:15:10.667",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -85,7 +85,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
@ -95,7 +95,7 @@
]
},
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@ -169,6 +169,10 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5410",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31003",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-05-31T20:15:07.910",
"lastModified": "2022-12-03T01:21:58.983",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-24T21:15:10.760",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -85,9 +85,13 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
},
{
"lang": "en",
"value": "CWE-787"
@ -95,13 +99,9 @@
]
},
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
},
{
"lang": "en",
"value": "CWE-787"
@ -173,6 +173,10 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5410",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-41221",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T21:15:10.870",
"lastModified": "2023-05-24T21:15:10.870",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The client in OpenText Archive Center Administration through 21.2 allows XXE attacks. Authenticated users of the OpenText Archive Center Administration client (Versions 16.2.3, 21.2, and older versions) could upload XML files to the application that it did not sufficiently validate. As a result, attackers could craft XML files that, when processed by the application, would cause a negative security impact such as data exfiltration or localized denial of service against the application instance and system of the user running it."
}
],
"metrics": {},
"references": [
{
"url": "https://labs.withsecure.com/advisories/opentext-archive-center-administration-client-xxe-vulnerability",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2022-42225",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:09.763",
"lastModified": "2023-05-24T20:15:09.763",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Jumpserver 2.10.0 <= version <= 2.26.0 contains multiple stored XSS vulnerabilities because of improper filtering of user input, which can execute any javascript under admin's permission."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/bybit-sec/eb750c1d906c89e97092b29015472738",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/jumpserver/lina/blob/v2.10.0/src/views/settings/SystemMessageSubscription/SelectDialog.vue#L43",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/jumpserver/lina/blob/v2.11.0/src/layout/components/NavHeader/SiteMessages.vue#L40",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/jumpserver/lina/blob/v2.26.0/src/views/tickets/components/Comments.vue#L16",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45061",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-09T07:15:09.887",
"lastModified": "2023-05-16T23:04:21.670",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-24T21:15:10.923",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -270,6 +270,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47378",
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-05-15T10:15:09.460",
"lastModified": "2023-05-15T12:54:34.183",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:25:08.957",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -31,12 +31,32 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "info@cert.vde.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "info@cert.vde.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,12 +64,139 @@
"value": "CWE-20"
}
]
},
{
"source": "info@cert.vde.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.19.0",
"matchCriteriaId": "523FC1D5-2A13-4B4D-9EE6-7895A955F631"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.19.0",
"matchCriteriaId": "6E4DDA5F-C7CD-4ADE-AE44-B2F2C2F6B61C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.19.0",
"matchCriteriaId": "968E3873-9D42-4516-B884-56D49BB8BE8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.19.0",
"matchCriteriaId": "8FD4E051-A23A-4214-A599-5EDFD40B4843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.19.0",
"matchCriteriaId": "27B2E352-6ACE-4F3D-B462-4DE1197DAF04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.19.0",
"matchCriteriaId": "3F20DC27-C98B-49CF-9C39-9FB483438FD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.19.0",
"matchCriteriaId": "80A1AAE3-1A29-4B1E-8C50-0EA87D158371"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.19.0",
"matchCriteriaId": "9C58C0EB-17CF-4ACA-B691-BBB558A77B4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.19.0",
"matchCriteriaId": "00007AE1-3679-4D05-96E2-F0F45E73B2B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_rte_\\(for_beckhoff_cx\\)_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.8.0.0",
"matchCriteriaId": "44E6A757-BB46-467E-B0DD-916672995584"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_rte_\\(sl\\):*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.8.0.0",
"matchCriteriaId": "C74B30D2-2653-4D2A-BEEC-0AB1843097AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.8.0.0",
"matchCriteriaId": "A9CF7388-0541-4CEA-B83B-127466DA6635"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_win_\\(sl\\):*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.8.0.0",
"matchCriteriaId": "0D2297BF-E19B-4FA6-841F-0D5915D345CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.8.0.0",
"matchCriteriaId": "BBAA2041-8C65-4CC5-AC77-45DE2DEA458F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:hmi_\\(sl\\):*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.8.0.0",
"matchCriteriaId": "A2F76A22-9A91-4683-8F85-322E2AA00E28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.8.0.0",
"matchCriteriaId": "B37C6669-08B9-4588-B871-3203E8ABFCE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.8.0.0",
"matchCriteriaId": "B4E932B1-1475-40A0-AF58-D4F643A6A850"
}
]
}
]
}
],
"references": [
{
"url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=",
"source": "info@cert.vde.com"
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47391",
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-05-15T10:15:10.390",
"lastModified": "2023-05-15T12:54:34.183",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:25:29.760",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -46,10 +46,109 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.7.0.0",
"matchCriteriaId": "194E2F1E-C70A-429E-B61C-B70902A6CDA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.7.0.0",
"matchCriteriaId": "FEFBC44F-0969-4806-AABD-B02DFEBF8F01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.7.0.0",
"matchCriteriaId": "7C405ECA-126C-4110-A18A-787D11377CE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.7.0.0",
"matchCriteriaId": "7047C70D-268D-45B7-A095-39B5A8345ACB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.7.0.0",
"matchCriteriaId": "38F84368-415F-4C37-A988-C8DB540F1345"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.7.0.0",
"matchCriteriaId": "A0B6F1D2-8408-4172-B3E9-7C276CC71433"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.7.0.0",
"matchCriteriaId": "94383C92-CBC7-4941-B06C-00D889316FEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.7.0.0",
"matchCriteriaId": "1785F440-BA92-4F37-9A72-F4AC971B3B8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.7.0.0",
"matchCriteriaId": "A320BED3-0F2F-45C0-9D74-8A21158B8ED9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_rte_\\(for_beckhoff_cx\\)_sl:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.18.40",
"matchCriteriaId": "7BF25557-407B-4FD3-9694-92159C8094B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_rte_\\(sl\\):*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.18.40",
"matchCriteriaId": "5BC8B234-3EC0-4737-8E12-CAA349FC7962"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.18.40",
"matchCriteriaId": "0C5905D5-B99C-4995-BEC7-A0E01D9E014B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:control_win_\\(sl\\):*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.18.40",
"matchCriteriaId": "34100446-7766-42D7-ACC4-D9C3193797C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:hmi_\\(sl\\):*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.18.40",
"matchCriteriaId": "2C7CEA77-B831-4047-BA85-B587DDF25C7C"
}
]
}
]
}
],
"references": [
{
"url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17555&token=212fc7e39bdd260cab6d6ca84333d42f50bcb3da&download=",
"source": "info@cert.vde.com"
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47516",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-18T05:15:11.200",
"lastModified": "2023-02-23T00:15:11.220",
"lastModified": "2023-05-24T21:15:11.037",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,6 +84,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00028.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5410",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,49 @@
"id": "CVE-2023-1729",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-15T22:15:10.350",
"lastModified": "2023-05-19T03:15:08.623",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:55:15.687",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -27,22 +60,104 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023-01-14",
"matchCriteriaId": "87AF9485-5698-410D-96B7-591934CD978B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188240",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/LibRaw/LibRaw/issues/557",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZ6XF5WTPJ4GLXQ62JVRDZSVSJHXNQU/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,83 @@
"id": "CVE-2023-20880",
"sourceIdentifier": "security@vmware.com",
"published": "2023-05-12T21:15:09.173",
"lastModified": "2023-05-15T12:54:45.023",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:19:03.607",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "VMware Aria Operations contains a privilege escalation vulnerability. A malicious actor with administrative access to the local system can escalate privileges to 'root'."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:aria_operations:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndExcluding": "8.12.0",
"matchCriteriaId": "6CE1B0DC-3368-4158-8DC1-E793E11D8116"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "4.5",
"matchCriteriaId": "4BF004A8-90A0-4804-97DA-C2C2005A54AA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.vmware.com/security/advisories/VMSA-2023-0009.html",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22741",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-01-19T22:15:11.273",
"lastModified": "2023-01-27T12:54:08.137",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-24T21:15:11.190",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -56,22 +56,22 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-120"
}
]
},
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
"value": "CWE-787"
}
]
}
@ -111,6 +111,10 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5410",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-25598",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:09.913",
"lastModified": "2023-05-24T20:15:09.913",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the conferencing component of Mitel MiVoice Connect through 19.3 SP2 and 20.x, 21.x, and 22.x through 22.24.1500.0 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the home.php page. A successful exploit could allow an attacker to execute arbitrary scripts."
}
],
"metrics": {},
"references": [
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0003",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-25599",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T21:15:11.380",
"lastModified": "2023-05-24T21:15:11.380",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the conferencing component of Mitel MiVoice Connect through 19.3 SP2 and 20.x, 21.x, and 22.x through 22.24.1500.0 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the test_presenter.php page. A successful exploit could allow an attacker to execute arbitrary scripts."
}
],
"metrics": {},
"references": [
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0003",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-29721",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T21:15:11.470",
"lastModified": "2023-05-24T21:15:11.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SofaWiki <= 3.8.9 has a file upload vulnerability that leads to command execution."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/bellenuit/sofawiki/issues/27",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/xul18/Showcase/issues/2",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30189",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T20:15:09.273",
"lastModified": "2023-05-17T12:46:50.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:41:34.643",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -34,10 +54,45 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:posthemes:posstaticblocks:*:*:*:*:*:prestashop:*:*",
"versionEndIncluding": "1.0.0",
"matchCriteriaId": "14081B16-6E49-46C2-AC14-38178E1B0B8C"
}
]
}
]
}
],
"references": [
{
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/04/27/posstaticblocks.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-30281",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T20:15:09.323",
"lastModified": "2023-05-17T12:46:50.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:41:21.293",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in the ps_customer table of Prestashop scquickaccounting before v3.7.3 allows attackers to access sensitive information stored in the component."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:storecommander:scquickaccounting:*:*:*:*:*:prestashop:*:*",
"versionEndExcluding": "3.7.3",
"matchCriteriaId": "68F7CD87-042E-4638-92F9-2CED66C93FAD"
}
]
}
]
}
],
"references": [
{
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/05/04/scquickaccounting.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31145",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-15T21:15:09.293",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:59:00.897",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +66,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4.27",
"matchCriteriaId": "098C5EA7-08FA-4765-916B-4BDC839093FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.06.2",
"versionEndExcluding": "21.11.9",
"matchCriteriaId": "2E9E333F-1435-4133-B77C-95A2BD557AB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.05.0",
"versionEndExcluding": "22.05.13",
"matchCriteriaId": "3996A955-91D7-425D-AE9D-B7BDF4ED78C2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-rqj2-2c2x-gjmm",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-31457",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:09.977",
"lastModified": "2023-05-24T20:15:09.977",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Headquarters server component of Mitel MiVoice Connect versions 19.3 SP2 (22.24.1500.0) and earlier could allow an unauthenticated attacker with internal network access to execute arbitrary scripts due to improper access control."
}
],
"metrics": {},
"references": [
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0004",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-31458",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T21:15:11.520",
"lastModified": "2023-05-24T21:15:11.520",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Edge Gateway component of Mitel MiVoice Connect versions 19.3 SP2 (22.24.1500.0) and earlier could allow an unauthenticated attacker with internal network access to authenticate with administrative privileges, because initial installation does not enforce a password change. A successful exploit could allow an attacker to make arbitrary configuration changes and execute arbitrary commands."
}
],
"metrics": {},
"references": [
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0005",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-31459",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.033",
"lastModified": "2023-05-24T20:15:10.033",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Connect Mobility Router component of Mitel MiVoice Connect versions 9.6.2208.101 and earlier could allow an unauthenticated attacker with internal network access to authenticate with administrative privileges, because the initial installation does not enforce a password change. A successful exploit could allow an attacker to make arbitrary configuration changes and execute arbitrary commands."
}
],
"metrics": {},
"references": [
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0006",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-31460",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.093",
"lastModified": "2023-05-24T20:15:10.093",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Connect Mobility Router component of MiVoice Connect versions 9.6.2208.101 and earlier could allow an authenticated attacker with internal network access to conduct a command injection attack due to insufficient restriction on URL parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org"
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0007",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,23 +2,98 @@
"id": "CVE-2023-31544",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T21:15:09.027",
"lastModified": "2023-05-17T12:46:50.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:41:01.150",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in alkacon-OpenCMS v11.0.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field under the Upload Image module."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:alkacon:opencms:11.0:-:*:*:*:*:*:*",
"matchCriteriaId": "745FD94C-C000-4E6B-B294-2805AC3616F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:alkacon:opencms:11.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "62CE8688-6DE4-4474-A4C5-407B35C7A981"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:alkacon:opencms:11.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E88DB6B7-D5DC-464C-B8D7-A364448A5B13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:alkacon:opencms:11.0:rc:*:*:*:*:*:*",
"matchCriteriaId": "C051CC98-D045-481C-84D3-A86350BCAE42"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/alkacon/opencms-core/commit/21bfbeaf6b038e2c03bb421ce7f0933dd7a7633e",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/alkacon/opencms-core/issues/652",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-31595",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.150",
"lastModified": "2023-05-24T20:15:10.150",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IC Realtime ICIP-P2012T 2.420 is vulnerable to Incorrect Access Control via unauthenticated port access."
}
],
"metrics": {},
"references": [
{
"url": "http://ic.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Yozarseef95/CVE-2023-31595",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-31611",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-15T15:15:11.770",
"lastModified": "2023-05-15T15:20:32.293",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:34:37.210",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue in the __libc_longjmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1119",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-31677",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:13.913",
"lastModified": "2023-05-17T12:46:50.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:40:42.440",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in luowice 3.5.18 allow attackers to view information for other alarm devices via modification of the eseeid parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:luowice:luowice:3.5.18:*:*:*:*:android:*:*",
"matchCriteriaId": "7FDFAFAB-A294-4CCF-8D5C-9C7672BBDE4E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zzh-newlearner/record/blob/main/luowice.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-31679",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:14.003",
"lastModified": "2023-05-17T12:46:46.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:39:39.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in Videogo v6.8.1 allows attackers to access images from other devices via modification of the Device Id parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:videogo_project:videogo:6.8.1:*:*:*:*:android:*:*",
"matchCriteriaId": "0832E72D-15E3-4C6C-BE94-B95F99EB8253"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zzh-newlearner/record/blob/main/yingshi_privacy.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,84 @@
"id": "CVE-2023-31724",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-17T15:15:08.917",
"lastModified": "2023-05-17T17:00:54.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T21:17:19.583",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function do_directive at /nasm/nasm-pp.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/SEGV/nasm-pp.c:3570%20in%20do_directive",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/yasm/yasm/issues/222",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,84 @@
"id": "CVE-2023-31725",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-17T15:15:08.957",
"lastModified": "2023-05-17T17:00:54.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T21:03:41.430",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "yasm 1.3.0.55.g101bc was discovered to contain a heap-use-after-free via the function expand_mmac_params at yasm/modules/preprocs/nasm/nasm-pp.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/yasm/yasm/issues/221",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32068",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-15T21:15:09.367",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T21:02:50.490",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,22 +66,57 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.10.4",
"matchCriteriaId": "8F237F1D-24B8-40CA-964D-6AD68EE14722"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xwiki:xwiki:15.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "88E41345-F81E-401A-BD67-66AF4B3925D4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/xwiki/xwiki-platform/commit/e4f7f68e93cb08c25632c126356d218abf192d1e",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6gvj-8vc5-8v3j",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jira.xwiki.org/browse/XWIKI-20096",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jira.xwiki.org/browse/XWIKI-20549",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32313",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-15T20:15:09.070",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:43:19.080",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,22 +76,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "3.9.18",
"matchCriteriaId": "80ED3198-E3DA-4ACD-883B-10CDB835BA33"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/patriksimek/vm2/commit/5206ba25afd86ef547a2c9d48d46ca7a9e6ec238",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/patriksimek/vm2/releases/tag/3.9.18",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32314",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-15T20:15:09.177",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:50:46.247",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,22 +76,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "3.9.18",
"matchCriteriaId": "80ED3198-E3DA-4ACD-883B-10CDB835BA33"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/patriksimek/vm2/commit/d88105f99752305c5b8a77b63ddee3ec86912daf",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/patriksimek/vm2/releases/tag/3.9.18",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/patriksimek/vm2/security/advisories/GHSA-whpj-8f3w-67p5",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,27 +2,90 @@
"id": "CVE-2023-32787",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-15T15:15:12.823",
"lastModified": "2023-05-15T15:20:32.293",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-24T20:41:17.287",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The OPC UA Legacy Java Stack before 6f176f2 enables an attacker to block OPC UA server applications via uncontrolled resource consumption so that they can no longer serve client applications."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opcfoundation:ua_java_legacy:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023-04-28",
"matchCriteriaId": "A87006B3-496C-4A85-A1BE-4F2B18C5438C"
}
]
}
]
}
],
"references": [
{
"url": "https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-32787.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://github.com/OPCFoundation/UA-Java-Legacy",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/OPCFoundation/UA-Java-Legacy/commit/6f176f2b445a27c157f1a32f225accc9ce8873c0",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33785",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.210",
"lastModified": "2023-05-24T20:15:10.210",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Rack Roles (/dcim/rack-roles/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/8",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33786",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.263",
"lastModified": "2023-05-24T20:15:10.263",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Circuit Types (/circuits/circuit-types/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/2",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33787",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.317",
"lastModified": "2023-05-24T20:15:10.317",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Tenant Groups (/tenancy/tenant-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/6",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33788",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.373",
"lastModified": "2023-05-24T20:15:10.373",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Providers (/circuits/providers/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33789",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.430",
"lastModified": "2023-05-24T20:15:10.430",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Contact Groups (/tenancy/contact-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/7",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33790",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.487",
"lastModified": "2023-05-24T20:15:10.487",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Locations (/dcim/locations/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/9",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33791",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.543",
"lastModified": "2023-05-24T20:15:10.543",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Provider Accounts (/circuits/provider-accounts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/4",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33792",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.607",
"lastModified": "2023-05-24T20:15:10.607",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Site Groups (/dcim/site-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/10",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33793",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.663",
"lastModified": "2023-05-24T20:15:10.663",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Power Panels (/dcim/power-panels/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/1",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33794",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.717",
"lastModified": "2023-05-24T20:15:10.717",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Tenants (/tenancy/tenants/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/5",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33795",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.773",
"lastModified": "2023-05-24T20:15:10.773",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Contact Roles (/tenancy/contact-roles/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/15",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33796",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.827",
"lastModified": "2023-05-24T20:15:10.827",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Netbox v3.5.1 allows unauthenticated attackers to execute queries against the GraphQL database, granting them access to sensitive data stored in the database."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/16",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33797",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.893",
"lastModified": "2023-05-24T20:15:10.893",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Sites (/dcim/sites/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/12",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33798",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:10.947",
"lastModified": "2023-05-24T20:15:10.947",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Rack (/dcim/rack/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/13",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33799",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:11.003",
"lastModified": "2023-05-24T20:15:11.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Contacts (/tenancy/contacts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/14",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33800",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:11.060",
"lastModified": "2023-05-24T20:15:11.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create Regions (/dcim/regions/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/anhdq201/netbox/issues/11",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-33829",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T21:15:11.567",
"lastModified": "2023-05-24T21:15:11.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in Cloudogu GmbH SCM Manager v1.2 to v1.60 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description text field."
}
],
"metrics": {},
"references": [
{
"url": "https://bitbucket.org/sdorra/docker-scm-manager/src/master/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/n3gox/Stored-XSS-on-SCM-Manager-1.60",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-24T20:00:34.588212+00:00
2023-05-24T22:00:26.529692+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-24T19:28:04.420000+00:00
2023-05-24T21:17:19.583000+00:00
```
### Last Data Feed Release
@ -29,39 +29,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
215941
215969
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `28`
* [CVE-2023-2870](CVE-2023/CVE-2023-28xx/CVE-2023-2870.json) (`2023-05-24T18:15:10.217`)
* [CVE-2023-2871](CVE-2023/CVE-2023-28xx/CVE-2023-2871.json) (`2023-05-24T18:15:10.337`)
* [CVE-2023-2872](CVE-2023/CVE-2023-28xx/CVE-2023-2872.json) (`2023-05-24T18:15:10.413`)
* [CVE-2023-2873](CVE-2023/CVE-2023-28xx/CVE-2023-2873.json) (`2023-05-24T18:15:10.493`)
* [CVE-2023-33980](CVE-2023/CVE-2023-339xx/CVE-2023-33980.json) (`2023-05-24T18:15:10.827`)
* [CVE-2023-33981](CVE-2023/CVE-2023-339xx/CVE-2023-33981.json) (`2023-05-24T18:15:10.877`)
* [CVE-2023-33982](CVE-2023/CVE-2023-339xx/CVE-2023-33982.json) (`2023-05-24T18:15:10.927`)
* [CVE-2023-33983](CVE-2023/CVE-2023-339xx/CVE-2023-33983.json) (`2023-05-24T18:15:10.983`)
* [CVE-2023-2868](CVE-2023/CVE-2023-28xx/CVE-2023-2868.json) (`2023-05-24T19:15:09.363`)
* [CVE-2023-2874](CVE-2023/CVE-2023-28xx/CVE-2023-2874.json) (`2023-05-24T19:15:09.443`)
* [CVE-2023-2875](CVE-2023/CVE-2023-28xx/CVE-2023-2875.json) (`2023-05-24T19:15:09.517`)
* [CVE-2023-25598](CVE-2023/CVE-2023-255xx/CVE-2023-25598.json) (`2023-05-24T20:15:09.913`)
* [CVE-2023-31457](CVE-2023/CVE-2023-314xx/CVE-2023-31457.json) (`2023-05-24T20:15:09.977`)
* [CVE-2023-31459](CVE-2023/CVE-2023-314xx/CVE-2023-31459.json) (`2023-05-24T20:15:10.033`)
* [CVE-2023-31460](CVE-2023/CVE-2023-314xx/CVE-2023-31460.json) (`2023-05-24T20:15:10.093`)
* [CVE-2023-31595](CVE-2023/CVE-2023-315xx/CVE-2023-31595.json) (`2023-05-24T20:15:10.150`)
* [CVE-2023-33785](CVE-2023/CVE-2023-337xx/CVE-2023-33785.json) (`2023-05-24T20:15:10.210`)
* [CVE-2023-33786](CVE-2023/CVE-2023-337xx/CVE-2023-33786.json) (`2023-05-24T20:15:10.263`)
* [CVE-2023-33787](CVE-2023/CVE-2023-337xx/CVE-2023-33787.json) (`2023-05-24T20:15:10.317`)
* [CVE-2023-33788](CVE-2023/CVE-2023-337xx/CVE-2023-33788.json) (`2023-05-24T20:15:10.373`)
* [CVE-2023-33789](CVE-2023/CVE-2023-337xx/CVE-2023-33789.json) (`2023-05-24T20:15:10.430`)
* [CVE-2023-33790](CVE-2023/CVE-2023-337xx/CVE-2023-33790.json) (`2023-05-24T20:15:10.487`)
* [CVE-2023-33791](CVE-2023/CVE-2023-337xx/CVE-2023-33791.json) (`2023-05-24T20:15:10.543`)
* [CVE-2023-33792](CVE-2023/CVE-2023-337xx/CVE-2023-33792.json) (`2023-05-24T20:15:10.607`)
* [CVE-2023-33793](CVE-2023/CVE-2023-337xx/CVE-2023-33793.json) (`2023-05-24T20:15:10.663`)
* [CVE-2023-33794](CVE-2023/CVE-2023-337xx/CVE-2023-33794.json) (`2023-05-24T20:15:10.717`)
* [CVE-2023-33795](CVE-2023/CVE-2023-337xx/CVE-2023-33795.json) (`2023-05-24T20:15:10.773`)
* [CVE-2023-33796](CVE-2023/CVE-2023-337xx/CVE-2023-33796.json) (`2023-05-24T20:15:10.827`)
* [CVE-2023-33797](CVE-2023/CVE-2023-337xx/CVE-2023-33797.json) (`2023-05-24T20:15:10.893`)
* [CVE-2023-33798](CVE-2023/CVE-2023-337xx/CVE-2023-33798.json) (`2023-05-24T20:15:10.947`)
* [CVE-2023-33799](CVE-2023/CVE-2023-337xx/CVE-2023-33799.json) (`2023-05-24T20:15:11.003`)
* [CVE-2023-33800](CVE-2023/CVE-2023-338xx/CVE-2023-33800.json) (`2023-05-24T20:15:11.060`)
* [CVE-2023-25599](CVE-2023/CVE-2023-255xx/CVE-2023-25599.json) (`2023-05-24T21:15:11.380`)
* [CVE-2023-29721](CVE-2023/CVE-2023-297xx/CVE-2023-29721.json) (`2023-05-24T21:15:11.470`)
* [CVE-2023-31458](CVE-2023/CVE-2023-314xx/CVE-2023-31458.json) (`2023-05-24T21:15:11.520`)
* [CVE-2023-33829](CVE-2023/CVE-2023-338xx/CVE-2023-33829.json) (`2023-05-24T21:15:11.567`)
### CVEs modified in the last Commit
Recently modified CVEs: `9`
Recently modified CVEs: `31`
* [CVE-2022-31137](CVE-2022/CVE-2022-311xx/CVE-2022-31137.json) (`2023-05-24T18:15:09.563`)
* [CVE-2022-41544](CVE-2022/CVE-2022-415xx/CVE-2022-41544.json) (`2023-05-24T18:15:09.777`)
* [CVE-2023-1934](CVE-2023/CVE-2023-19xx/CVE-2023-1934.json) (`2023-05-24T18:15:09.877`)
* [CVE-2023-27350](CVE-2023/CVE-2023-273xx/CVE-2023-27350.json) (`2023-05-24T18:15:09.980`)
* [CVE-2023-27524](CVE-2023/CVE-2023-275xx/CVE-2023-27524.json) (`2023-05-24T18:15:10.103`)
* [CVE-2023-30256](CVE-2023/CVE-2023-302xx/CVE-2023-30256.json) (`2023-05-24T18:15:10.593`)
* [CVE-2023-31702](CVE-2023/CVE-2023-317xx/CVE-2023-31702.json) (`2023-05-24T18:15:10.673`)
* [CVE-2023-31703](CVE-2023/CVE-2023-317xx/CVE-2023-31703.json) (`2023-05-24T18:15:10.753`)
* [CVE-2023-27979](CVE-2023/CVE-2023-279xx/CVE-2023-27979.json) (`2023-05-24T19:28:04.420`)
* [CVE-2021-3737](CVE-2021/CVE-2021-37xx/CVE-2021-3737.json) (`2023-05-24T21:15:10.180`)
* [CVE-2021-4189](CVE-2021/CVE-2021-41xx/CVE-2021-4189.json) (`2023-05-24T21:15:10.313`)
* [CVE-2022-47378](CVE-2022/CVE-2022-473xx/CVE-2022-47378.json) (`2023-05-24T20:25:08.957`)
* [CVE-2022-47391](CVE-2022/CVE-2022-473xx/CVE-2022-47391.json) (`2023-05-24T20:25:29.760`)
* [CVE-2022-31001](CVE-2022/CVE-2022-310xx/CVE-2022-31001.json) (`2023-05-24T21:15:10.540`)
* [CVE-2022-31002](CVE-2022/CVE-2022-310xx/CVE-2022-31002.json) (`2023-05-24T21:15:10.667`)
* [CVE-2022-31003](CVE-2022/CVE-2022-310xx/CVE-2022-31003.json) (`2023-05-24T21:15:10.760`)
* [CVE-2022-45061](CVE-2022/CVE-2022-450xx/CVE-2022-45061.json) (`2023-05-24T21:15:10.923`)
* [CVE-2022-47516](CVE-2022/CVE-2022-475xx/CVE-2022-47516.json) (`2023-05-24T21:15:11.037`)
* [CVE-2023-20880](CVE-2023/CVE-2023-208xx/CVE-2023-20880.json) (`2023-05-24T20:19:03.607`)
* [CVE-2023-31611](CVE-2023/CVE-2023-316xx/CVE-2023-31611.json) (`2023-05-24T20:34:37.210`)
* [CVE-2023-31679](CVE-2023/CVE-2023-316xx/CVE-2023-31679.json) (`2023-05-24T20:39:39.120`)
* [CVE-2023-31677](CVE-2023/CVE-2023-316xx/CVE-2023-31677.json) (`2023-05-24T20:40:42.440`)
* [CVE-2023-31544](CVE-2023/CVE-2023-315xx/CVE-2023-31544.json) (`2023-05-24T20:41:01.150`)
* [CVE-2023-32787](CVE-2023/CVE-2023-327xx/CVE-2023-32787.json) (`2023-05-24T20:41:17.287`)
* [CVE-2023-30281](CVE-2023/CVE-2023-302xx/CVE-2023-30281.json) (`2023-05-24T20:41:21.293`)
* [CVE-2023-30189](CVE-2023/CVE-2023-301xx/CVE-2023-30189.json) (`2023-05-24T20:41:34.643`)
* [CVE-2023-32313](CVE-2023/CVE-2023-323xx/CVE-2023-32313.json) (`2023-05-24T20:43:19.080`)
* [CVE-2023-32314](CVE-2023/CVE-2023-323xx/CVE-2023-32314.json) (`2023-05-24T20:50:46.247`)
* [CVE-2023-1729](CVE-2023/CVE-2023-17xx/CVE-2023-1729.json) (`2023-05-24T20:55:15.687`)
* [CVE-2023-31145](CVE-2023/CVE-2023-311xx/CVE-2023-31145.json) (`2023-05-24T20:59:00.897`)
* [CVE-2023-32068](CVE-2023/CVE-2023-320xx/CVE-2023-32068.json) (`2023-05-24T21:02:50.490`)
* [CVE-2023-31725](CVE-2023/CVE-2023-317xx/CVE-2023-31725.json) (`2023-05-24T21:03:41.430`)
* [CVE-2023-22741](CVE-2023/CVE-2023-227xx/CVE-2023-22741.json) (`2023-05-24T21:15:11.190`)
* [CVE-2023-31724](CVE-2023/CVE-2023-317xx/CVE-2023-31724.json) (`2023-05-24T21:17:19.583`)
## Download and Usage