diff --git a/CVE-2019/CVE-2019-186xx/CVE-2019-18604.json b/CVE-2019/CVE-2019-186xx/CVE-2019-18604.json index 191de221eb0..9437f2a0206 100644 --- a/CVE-2019/CVE-2019-186xx/CVE-2019-18604.json +++ b/CVE-2019/CVE-2019-186xx/CVE-2019-18604.json @@ -2,8 +2,8 @@ "id": "CVE-2019-18604", "sourceIdentifier": "cve@mitre.org", "published": "2019-10-29T19:15:19.703", - "lastModified": "2021-07-21T11:39:23.747", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-31T23:15:09.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -117,6 +117,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00033.html", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-383xx/CVE-2022-38356.json b/CVE-2022/CVE-2022-383xx/CVE-2022-38356.json index 834df549494..2ddcaa7e167 100644 --- a/CVE-2022/CVE-2022-383xx/CVE-2022-38356.json +++ b/CVE-2022/CVE-2022-383xx/CVE-2022-38356.json @@ -2,8 +2,8 @@ "id": "CVE-2022-38356", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-25T11:15:09.077", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T22:47:25.047", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stylemixthemes:pearl_header_builder:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.4", + "matchCriteriaId": "793AE73F-30F9-4DD9-A0C3-F38FD55C7510" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/pearl-header-builder/wordpress-pearl-plugin-1-3-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-387xx/CVE-2022-38716.json b/CVE-2022/CVE-2022-387xx/CVE-2022-38716.json index 197a3040d0a..b4a720ab383 100644 --- a/CVE-2022/CVE-2022-387xx/CVE-2022-38716.json +++ b/CVE-2022/CVE-2022-387xx/CVE-2022-38716.json @@ -2,8 +2,8 @@ "id": "CVE-2022-38716", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-25T11:15:09.150", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T22:47:16.617", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stylemixthemes:motors_-_car_dealer\\,_classifieds_\\&_listing:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.4", + "matchCriteriaId": "406DA5F8-B17E-4B0A-A9ED-EED0C61CB58B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/motors-car-dealership-classified-listings/wordpress-motors-plugin-1-4-4-multiple-cross-site-request-forgery-csrf-vulnerabilities?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-419xx/CVE-2022-41987.json b/CVE-2022/CVE-2022-419xx/CVE-2022-41987.json index 8b20e6fb4f8..a724b8b96bc 100644 --- a/CVE-2022/CVE-2022-419xx/CVE-2022-41987.json +++ b/CVE-2022/CVE-2022-419xx/CVE-2022-41987.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41987", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-25T11:15:09.223", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T22:47:06.207", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:badgeos:badgeos:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.7.1.6", + "matchCriteriaId": "23E4DAD4-EF69-42D5-B005-C459EB62242C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/badgeos/wordpress-badgeos-plugin-3-7-1-6-multiple-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43490.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43490.json index 0d3aefe7a54..8178395d25b 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43490.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43490.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43490", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-25T11:15:09.287", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T22:46:53.863", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwp:stream:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.2", + "matchCriteriaId": "FEB21A6D-33DD-45EA-8EB4-A544753408B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/stream/wordpress-stream-plugin-3-9-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45371.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45371.json index 7c0e73e449d..247aace9d31 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45371.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45371.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45371", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-25T11:15:09.353", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T22:46:32.283", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmet:shopengine:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.1.1", + "matchCriteriaId": "ED855157-7523-47F8-9F6B-AA0CADF7B447" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/shopengine/wordpress-shopengine-plugin-4-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2882.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2882.json index 5c26d41beca..93cbbc6a254 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2882.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2882.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2882", "sourceIdentifier": "cve@usom.gov.tr", "published": "2023-05-25T09:15:12.010", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T22:46:11.953", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "cve@usom.gov.tr", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "cve@usom.gov.tr", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "cve@usom.gov.tr", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "cve@usom.gov.tr", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +76,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.3.4", + "matchCriteriaId": "CD69E8DE-2EB4-407E-A483-2D974E33EE13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.3.7", + "matchCriteriaId": "4D6A686E-8F9D-4A23-941A-4C6C2FCDEA60" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-23-0293", - "source": "cve@usom.gov.tr" + "source": "cve@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2883.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2883.json index 965234c97af..30fb3d0af96 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2883.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2883.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2883", "sourceIdentifier": "cve@usom.gov.tr", "published": "2023-05-25T09:15:12.093", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T22:45:30.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,10 +46,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.3.4", + "matchCriteriaId": "CD69E8DE-2EB4-407E-A483-2D974E33EE13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.3.7", + "matchCriteriaId": "4D6A686E-8F9D-4A23-941A-4C6C2FCDEA60" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-23-0293", - "source": "cve@usom.gov.tr" + "source": "cve@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2884.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2884.json index be5933aad33..24bfa8498ba 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2884.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2884.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2884", "sourceIdentifier": "cve@usom.gov.tr", "published": "2023-05-25T09:15:12.163", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T22:45:11.777", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "cve@usom.gov.tr", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "cve@usom.gov.tr", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", @@ -50,10 +70,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.3.4", + "matchCriteriaId": "CD69E8DE-2EB4-407E-A483-2D974E33EE13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.3.7", + "matchCriteriaId": "4D6A686E-8F9D-4A23-941A-4C6C2FCDEA60" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-23-0293", - "source": "cve@usom.gov.tr" + "source": "cve@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2885.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2885.json index 01fdeeb270b..78d2534a144 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2885.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2885.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2885", "sourceIdentifier": "cve@usom.gov.tr", "published": "2023-05-25T09:15:12.237", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T22:44:48.197", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "cve@usom.gov.tr", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + }, + { + "source": "cve@usom.gov.tr", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "cve@usom.gov.tr", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-924" + } + ] + }, + { + "source": "cve@usom.gov.tr", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +76,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.3.4", + "matchCriteriaId": "CD69E8DE-2EB4-407E-A483-2D974E33EE13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.3.7", + "matchCriteriaId": "4D6A686E-8F9D-4A23-941A-4C6C2FCDEA60" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-23-0293", - "source": "cve@usom.gov.tr" + "source": "cve@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2886.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2886.json index d29532ebd8f..f8dd69aea58 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2886.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2886.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2886", "sourceIdentifier": "cve@usom.gov.tr", "published": "2023-05-25T09:15:12.303", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T22:44:10.073", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "cve@usom.gov.tr", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "cve@usom.gov.tr", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", @@ -46,10 +66,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.3.4", + "matchCriteriaId": "CD69E8DE-2EB4-407E-A483-2D974E33EE13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.0.3.7", + "matchCriteriaId": "4D6A686E-8F9D-4A23-941A-4C6C2FCDEA60" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-23-0293", - "source": "cve@usom.gov.tr" + "source": "cve@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 31086593ace..ce5a1011567 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-31T22:00:25.295166+00:00 +2023-05-31T23:55:24.988150+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-31T21:15:10.137000+00:00 +2023-05-31T23:15:09.307000+00:00 ``` ### Last Data Feed Release @@ -34,56 +34,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `29` +Recently added CVEs: `0` -* [CVE-2023-33730](CVE-2023/CVE-2023-337xx/CVE-2023-33730.json) (`2023-05-31T20:15:10.630`) -* [CVE-2023-33732](CVE-2023/CVE-2023-337xx/CVE-2023-33732.json) (`2023-05-31T20:15:10.677`) -* [CVE-2023-33735](CVE-2023/CVE-2023-337xx/CVE-2023-33735.json) (`2023-05-31T20:15:10.720`) -* [CVE-2023-34255](CVE-2023/CVE-2023-342xx/CVE-2023-34255.json) (`2023-05-31T20:15:10.767`) -* [CVE-2023-34256](CVE-2023/CVE-2023-342xx/CVE-2023-34256.json) (`2023-05-31T20:15:10.817`) -* [CVE-2023-34257](CVE-2023/CVE-2023-342xx/CVE-2023-34257.json) (`2023-05-31T20:15:10.860`) -* [CVE-2023-34258](CVE-2023/CVE-2023-342xx/CVE-2023-34258.json) (`2023-05-31T20:15:10.903`) -* [CVE-2023-3006](CVE-2023/CVE-2023-30xx/CVE-2023-3006.json) (`2023-05-31T20:15:11.127`) -* [CVE-2023-33627](CVE-2023/CVE-2023-336xx/CVE-2023-33627.json) (`2023-05-31T21:15:09.423`) -* [CVE-2023-33628](CVE-2023/CVE-2023-336xx/CVE-2023-33628.json) (`2023-05-31T21:15:09.470`) -* [CVE-2023-33629](CVE-2023/CVE-2023-336xx/CVE-2023-33629.json) (`2023-05-31T21:15:09.520`) -* [CVE-2023-33630](CVE-2023/CVE-2023-336xx/CVE-2023-33630.json) (`2023-05-31T21:15:09.563`) -* [CVE-2023-33631](CVE-2023/CVE-2023-336xx/CVE-2023-33631.json) (`2023-05-31T21:15:09.607`) -* [CVE-2023-33632](CVE-2023/CVE-2023-336xx/CVE-2023-33632.json) (`2023-05-31T21:15:09.650`) -* [CVE-2023-33633](CVE-2023/CVE-2023-336xx/CVE-2023-33633.json) (`2023-05-31T21:15:09.690`) -* [CVE-2023-33634](CVE-2023/CVE-2023-336xx/CVE-2023-33634.json) (`2023-05-31T21:15:09.733`) -* [CVE-2023-33635](CVE-2023/CVE-2023-336xx/CVE-2023-33635.json) (`2023-05-31T21:15:09.780`) -* [CVE-2023-33636](CVE-2023/CVE-2023-336xx/CVE-2023-33636.json) (`2023-05-31T21:15:09.820`) -* [CVE-2023-33637](CVE-2023/CVE-2023-336xx/CVE-2023-33637.json) (`2023-05-31T21:15:09.877`) -* [CVE-2023-33638](CVE-2023/CVE-2023-336xx/CVE-2023-33638.json) (`2023-05-31T21:15:09.923`) -* [CVE-2023-33639](CVE-2023/CVE-2023-336xx/CVE-2023-33639.json) (`2023-05-31T21:15:09.967`) -* [CVE-2023-33640](CVE-2023/CVE-2023-336xx/CVE-2023-33640.json) (`2023-05-31T21:15:10.010`) -* [CVE-2023-33641](CVE-2023/CVE-2023-336xx/CVE-2023-33641.json) (`2023-05-31T21:15:10.050`) -* [CVE-2023-33642](CVE-2023/CVE-2023-336xx/CVE-2023-33642.json) (`2023-05-31T21:15:10.097`) -* [CVE-2023-33643](CVE-2023/CVE-2023-336xx/CVE-2023-33643.json) (`2023-05-31T21:15:10.137`) ### CVEs modified in the last Commit -Recently modified CVEs: `17` +Recently modified CVEs: `11` -* [CVE-2022-30025](CVE-2022/CVE-2022-300xx/CVE-2022-30025.json) (`2023-05-31T20:57:27.357`) -* [CVE-2023-2874](CVE-2023/CVE-2023-28xx/CVE-2023-2874.json) (`2023-05-31T20:06:14.543`) -* [CVE-2023-2873](CVE-2023/CVE-2023-28xx/CVE-2023-2873.json) (`2023-05-31T20:14:12.547`) -* [CVE-2023-24329](CVE-2023/CVE-2023-243xx/CVE-2023-24329.json) (`2023-05-31T20:15:10.350`) -* [CVE-2023-28625](CVE-2023/CVE-2023-286xx/CVE-2023-28625.json) (`2023-05-31T20:15:10.493`) -* [CVE-2023-33949](CVE-2023/CVE-2023-339xx/CVE-2023-33949.json) (`2023-05-31T20:16:46.520`) -* [CVE-2023-32346](CVE-2023/CVE-2023-323xx/CVE-2023-32346.json) (`2023-05-31T20:17:36.940`) -* [CVE-2023-32347](CVE-2023/CVE-2023-323xx/CVE-2023-32347.json) (`2023-05-31T20:18:22.233`) -* [CVE-2023-2586](CVE-2023/CVE-2023-25xx/CVE-2023-2586.json) (`2023-05-31T20:19:02.373`) -* [CVE-2023-2588](CVE-2023/CVE-2023-25xx/CVE-2023-2588.json) (`2023-05-31T20:19:21.353`) -* [CVE-2023-33950](CVE-2023/CVE-2023-339xx/CVE-2023-33950.json) (`2023-05-31T20:22:30.147`) -* [CVE-2023-2862](CVE-2023/CVE-2023-28xx/CVE-2023-2862.json) (`2023-05-31T20:29:34.837`) -* [CVE-2023-2750](CVE-2023/CVE-2023-27xx/CVE-2023-2750.json) (`2023-05-31T20:29:42.987`) -* [CVE-2023-33940](CVE-2023/CVE-2023-339xx/CVE-2023-33940.json) (`2023-05-31T20:32:27.547`) -* [CVE-2023-33939](CVE-2023/CVE-2023-339xx/CVE-2023-33939.json) (`2023-05-31T20:35:06.760`) -* [CVE-2023-33942](CVE-2023/CVE-2023-339xx/CVE-2023-33942.json) (`2023-05-31T20:38:53.780`) -* [CVE-2023-33943](CVE-2023/CVE-2023-339xx/CVE-2023-33943.json) (`2023-05-31T20:42:51.747`) +* [CVE-2019-18604](CVE-2019/CVE-2019-186xx/CVE-2019-18604.json) (`2023-05-31T23:15:09.307`) +* [CVE-2022-45371](CVE-2022/CVE-2022-453xx/CVE-2022-45371.json) (`2023-05-31T22:46:32.283`) +* [CVE-2022-43490](CVE-2022/CVE-2022-434xx/CVE-2022-43490.json) (`2023-05-31T22:46:53.863`) +* [CVE-2022-41987](CVE-2022/CVE-2022-419xx/CVE-2022-41987.json) (`2023-05-31T22:47:06.207`) +* [CVE-2022-38716](CVE-2022/CVE-2022-387xx/CVE-2022-38716.json) (`2023-05-31T22:47:16.617`) +* [CVE-2022-38356](CVE-2022/CVE-2022-383xx/CVE-2022-38356.json) (`2023-05-31T22:47:25.047`) +* [CVE-2023-2886](CVE-2023/CVE-2023-28xx/CVE-2023-2886.json) (`2023-05-31T22:44:10.073`) +* [CVE-2023-2885](CVE-2023/CVE-2023-28xx/CVE-2023-2885.json) (`2023-05-31T22:44:48.197`) +* [CVE-2023-2884](CVE-2023/CVE-2023-28xx/CVE-2023-2884.json) (`2023-05-31T22:45:11.777`) +* [CVE-2023-2883](CVE-2023/CVE-2023-28xx/CVE-2023-2883.json) (`2023-05-31T22:45:30.307`) +* [CVE-2023-2882](CVE-2023/CVE-2023-28xx/CVE-2023-2882.json) (`2023-05-31T22:46:11.953`) ## Download and Usage