diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10118.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10118.json new file mode 100644 index 00000000000..e8599b5f4ff --- /dev/null +++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10118.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2015-10118", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-06-12T07:15:09.000", + "lastModified": "2023-06-12T07:15:09.000", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in cchetanonline WP-CopyProtect up to 3.0.0. This vulnerability affects the function CopyProtect_options_page of the file wp-copyprotect.php. The manipulation of the argument CopyProtect_nrc_text leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 3.1.0 is able to address this issue. The patch is identified as 8b8fe4102886b326330dc1ff06b17313fb10aee5. It is recommended to upgrade the affected component. VDB-231202 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wp-plugins/wp-copyprotect/commit/8b8fe4102886b326330dc1ff06b17313fb10aee5", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.231202", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.231202", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2017/CVE-2017-01xx/CVE-2017-0141.json b/CVE-2017/CVE-2017-01xx/CVE-2017-0141.json index 987d8828cb9..6e8871181df 100644 --- a/CVE-2017/CVE-2017-01xx/CVE-2017-0141.json +++ b/CVE-2017/CVE-2017-01xx/CVE-2017-0141.json @@ -2,7 +2,7 @@ "id": "CVE-2017-0141", "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:03.947", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-06-12T07:15:09.250", "vulnStatus": "Modified", "descriptions": [ { @@ -120,6 +120,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172826/Microsoft-ChakaCore-Remote-Code-Execution.html", + "source": "secure@microsoft.com" + }, { "url": "http://www.securityfocus.com/bid/96685", "source": "secure@microsoft.com", diff --git a/CVE-2017/CVE-2017-137xx/CVE-2017-13782.json b/CVE-2017/CVE-2017-137xx/CVE-2017-13782.json index 6d922af9f3e..e3986cad665 100644 --- a/CVE-2017/CVE-2017-137xx/CVE-2017-13782.json +++ b/CVE-2017/CVE-2017-137xx/CVE-2017-13782.json @@ -2,8 +2,8 @@ "id": "CVE-2017-13782", "sourceIdentifier": "product-security@apple.com", "published": "2017-11-13T03:29:00.223", - "lastModified": "2017-11-27T16:26:53.010", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:09.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -94,6 +94,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172827/Apple-XNU-Kernel-Memory-Exposure.html", + "source": "product-security@apple.com" + }, { "url": "http://www.securitytracker.com/id/1039710", "source": "product-security@apple.com", diff --git a/CVE-2017/CVE-2017-139xx/CVE-2017-13904.json b/CVE-2017/CVE-2017-139xx/CVE-2017-13904.json index f2d8a1033c7..598da495742 100644 --- a/CVE-2017/CVE-2017-139xx/CVE-2017-13904.json +++ b/CVE-2017/CVE-2017-139xx/CVE-2017-13904.json @@ -2,8 +2,8 @@ "id": "CVE-2017-13904", "sourceIdentifier": "product-security@apple.com", "published": "2018-04-03T06:29:01.187", - "lastModified": "2019-03-08T16:06:35.373", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:09.640", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -112,6 +112,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172828/Apple-packet-mangler-Remote-Code-Execution.html", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/HT208325", "source": "product-security@apple.com", diff --git a/CVE-2018/CVE-2018-10001xx/CVE-2018-1000140.json b/CVE-2018/CVE-2018-10001xx/CVE-2018-1000140.json index 9eeaf3e0769..68711dbfe99 100644 --- a/CVE-2018/CVE-2018-10001xx/CVE-2018-1000140.json +++ b/CVE-2018/CVE-2018-10001xx/CVE-2018-1000140.json @@ -2,8 +2,8 @@ "id": "CVE-2018-1000140", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-23T21:29:00.647", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:09.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -244,6 +244,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172829/librelp-Remote-Code-Execution.html", + "source": "cve@mitre.org" + }, { "url": "https://access.redhat.com/errata/RHSA-2018:1223", "source": "cve@mitre.org", diff --git a/CVE-2018/CVE-2018-117xx/CVE-2018-11776.json b/CVE-2018/CVE-2018-117xx/CVE-2018-11776.json index 3745e48a676..f228862813b 100644 --- a/CVE-2018/CVE-2018-117xx/CVE-2018-11776.json +++ b/CVE-2018/CVE-2018-117xx/CVE-2018-11776.json @@ -2,12 +2,12 @@ "id": "CVE-2018-11776", "sourceIdentifier": "security@apache.org", "published": "2018-08-22T13:29:00.753", - "lastModified": "2020-07-15T03:15:21.607", + "lastModified": "2023-06-12T07:15:10.077", "vulnStatus": "Modified", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apache Struts 2.3 to 2.3.34 and 2.5 to 2.5.16 Remote Code Execution Vulnerability", + "cisaVulnerabilityName": "Apache Struts Remote Code Execution Vulnerability", "descriptions": [ { "lang": "en", @@ -106,6 +106,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html", + "source": "security@apache.org" + }, { "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt", "source": "security@apache.org", diff --git a/CVE-2018/CVE-2018-42xx/CVE-2018-4249.json b/CVE-2018/CVE-2018-42xx/CVE-2018-4249.json index cdee44458cb..9b2b71534fd 100644 --- a/CVE-2018/CVE-2018-42xx/CVE-2018-4249.json +++ b/CVE-2018/CVE-2018-42xx/CVE-2018-4249.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4249", "sourceIdentifier": "product-security@apple.com", "published": "2018-06-08T18:29:02.743", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:10.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -116,6 +116,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172828/Apple-packet-mangler-Remote-Code-Execution.html", + "source": "product-security@apple.com" + }, { "url": "http://www.securitytracker.com/id/1041027", "source": "product-security@apple.com", diff --git a/CVE-2018/CVE-2018-42xx/CVE-2018-4259.json b/CVE-2018/CVE-2018-42xx/CVE-2018-4259.json index 5ae529cfd68..c0840dc4b24 100644 --- a/CVE-2018/CVE-2018-42xx/CVE-2018-4259.json +++ b/CVE-2018/CVE-2018-42xx/CVE-2018-4259.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4259", "sourceIdentifier": "product-security@apple.com", "published": "2019-04-03T18:29:03.313", - "lastModified": "2019-04-04T14:12:47.163", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:10.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -94,6 +94,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT208937", "source": "product-security@apple.com", diff --git a/CVE-2018/CVE-2018-42xx/CVE-2018-4286.json b/CVE-2018/CVE-2018-42xx/CVE-2018-4286.json index 0d2a0d86b8b..78af8785949 100644 --- a/CVE-2018/CVE-2018-42xx/CVE-2018-4286.json +++ b/CVE-2018/CVE-2018-42xx/CVE-2018-4286.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4286", "sourceIdentifier": "product-security@apple.com", "published": "2019-04-03T18:29:05.457", - "lastModified": "2019-04-04T19:54:49.690", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:10.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -94,6 +94,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT208937", "source": "product-security@apple.com", diff --git a/CVE-2018/CVE-2018-42xx/CVE-2018-4287.json b/CVE-2018/CVE-2018-42xx/CVE-2018-4287.json index da31987a666..ff6c68dddc1 100644 --- a/CVE-2018/CVE-2018-42xx/CVE-2018-4287.json +++ b/CVE-2018/CVE-2018-42xx/CVE-2018-4287.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4287", "sourceIdentifier": "product-security@apple.com", "published": "2019-04-03T18:29:05.503", - "lastModified": "2019-04-04T19:57:18.380", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:10.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -94,6 +94,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT208937", "source": "product-security@apple.com", diff --git a/CVE-2018/CVE-2018-42xx/CVE-2018-4288.json b/CVE-2018/CVE-2018-42xx/CVE-2018-4288.json index 0c9ecb8ef3d..7df0c712536 100644 --- a/CVE-2018/CVE-2018-42xx/CVE-2018-4288.json +++ b/CVE-2018/CVE-2018-42xx/CVE-2018-4288.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4288", "sourceIdentifier": "product-security@apple.com", "published": "2019-04-03T18:29:05.550", - "lastModified": "2019-04-04T18:34:27.283", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:10.767", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -94,6 +94,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT208937", "source": "product-security@apple.com", diff --git a/CVE-2018/CVE-2018-42xx/CVE-2018-4291.json b/CVE-2018/CVE-2018-42xx/CVE-2018-4291.json index b253c56f559..128da00333c 100644 --- a/CVE-2018/CVE-2018-42xx/CVE-2018-4291.json +++ b/CVE-2018/CVE-2018-42xx/CVE-2018-4291.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4291", "sourceIdentifier": "product-security@apple.com", "published": "2019-04-03T18:29:05.690", - "lastModified": "2019-04-04T18:23:15.267", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:10.863", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -94,6 +94,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT208937", "source": "product-security@apple.com", diff --git a/CVE-2018/CVE-2018-44xx/CVE-2018-4407.json b/CVE-2018/CVE-2018-44xx/CVE-2018-4407.json index a71d173328f..8c939a9f081 100644 --- a/CVE-2018/CVE-2018-44xx/CVE-2018-4407.json +++ b/CVE-2018/CVE-2018-44xx/CVE-2018-4407.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4407", "sourceIdentifier": "product-security@apple.com", "published": "2019-04-03T18:29:13.610", - "lastModified": "2019-04-05T14:04:05.367", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:10.957", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -112,6 +112,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172832/iOS-11.4.1-macOS-10.13.6-icmp_error-Heap-Buffer-Overflow.html", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT209106", "source": "product-security@apple.com", diff --git a/CVE-2018/CVE-2018-53xx/CVE-2018-5388.json b/CVE-2018/CVE-2018-53xx/CVE-2018-5388.json index cbba0ea9f04..d513d8eeb2d 100644 --- a/CVE-2018/CVE-2018-53xx/CVE-2018-5388.json +++ b/CVE-2018/CVE-2018-53xx/CVE-2018-5388.json @@ -2,7 +2,7 @@ "id": "CVE-2018-5388", "sourceIdentifier": "cret@cert.org", "published": "2018-05-31T13:29:00.220", - "lastModified": "2019-10-09T23:41:16.813", + "lastModified": "2023-06-12T07:15:11.077", "vulnStatus": "Modified", "descriptions": [ { @@ -161,6 +161,10 @@ "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00047.html", "source": "cret@cert.org" }, + { + "url": "http://packetstormsecurity.com/files/172833/strongSwan-VPN-Charon-Server-Buffer-Overflow.html", + "source": "cret@cert.org" + }, { "url": "http://www.kb.cert.org/vuls/id/338343", "source": "cret@cert.org", diff --git a/CVE-2019/CVE-2019-114xx/CVE-2019-11476.json b/CVE-2019/CVE-2019-114xx/CVE-2019-11476.json index 08d1f1fc3d6..22d43906b33 100644 --- a/CVE-2019/CVE-2019-114xx/CVE-2019-11476.json +++ b/CVE-2019/CVE-2019-114xx/CVE-2019-11476.json @@ -2,7 +2,7 @@ "id": "CVE-2019-11476", "sourceIdentifier": "security@ubuntu.com", "published": "2019-08-29T15:15:10.950", - "lastModified": "2019-10-09T23:45:24.917", + "lastModified": "2023-06-12T07:15:11.240", "vulnStatus": "Modified", "descriptions": [ { @@ -138,6 +138,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html", + "source": "security@ubuntu.com" + }, { "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/whoopsie/%2Bbug/1830863", "source": "security@ubuntu.com", diff --git a/CVE-2019/CVE-2019-114xx/CVE-2019-11481.json b/CVE-2019/CVE-2019-114xx/CVE-2019-11481.json index 5f3e6b76b4e..bee81fbccea 100644 --- a/CVE-2019/CVE-2019-114xx/CVE-2019-11481.json +++ b/CVE-2019/CVE-2019-114xx/CVE-2019-11481.json @@ -2,8 +2,8 @@ "id": "CVE-2019-11481", "sourceIdentifier": "security@ubuntu.com", "published": "2020-02-08T05:15:12.527", - "lastModified": "2020-02-12T21:21:33.557", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:11.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -148,6 +148,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html", + "source": "security@ubuntu.com" + }, { "url": "https://usn.ubuntu.com/usn/usn-4171-1", "source": "security@ubuntu.com", diff --git a/CVE-2019/CVE-2019-114xx/CVE-2019-11484.json b/CVE-2019/CVE-2019-114xx/CVE-2019-11484.json index a39cfe1e728..1e344332974 100644 --- a/CVE-2019/CVE-2019-114xx/CVE-2019-11484.json +++ b/CVE-2019/CVE-2019-114xx/CVE-2019-11484.json @@ -2,8 +2,8 @@ "id": "CVE-2019-11484", "sourceIdentifier": "security@ubuntu.com", "published": "2020-02-08T05:15:13.637", - "lastModified": "2020-02-12T18:17:58.367", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:11.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -153,6 +153,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html", + "source": "security@ubuntu.com" + }, { "url": "https://usn.ubuntu.com/usn/usn-4170-1", "source": "security@ubuntu.com", diff --git a/CVE-2019/CVE-2019-131xx/CVE-2019-13115.json b/CVE-2019/CVE-2019-131xx/CVE-2019-13115.json index 449eae4fd71..2e921f85e42 100644 --- a/CVE-2019/CVE-2019-131xx/CVE-2019-13115.json +++ b/CVE-2019/CVE-2019-131xx/CVE-2019-13115.json @@ -2,8 +2,8 @@ "id": "CVE-2019-13115", "sourceIdentifier": "cve@mitre.org", "published": "2019-07-16T18:15:13.287", - "lastModified": "2022-04-05T21:09:11.867", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:11.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -182,6 +182,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172834/libssh2-1.8.2-Out-Of-Bounds-Read.html", + "source": "cve@mitre.org" + }, { "url": "https://blog.semmle.com/libssh2-integer-overflow/", "source": "cve@mitre.org", diff --git a/CVE-2019/CVE-2019-157xx/CVE-2019-15790.json b/CVE-2019/CVE-2019-157xx/CVE-2019-15790.json index 946204ae6ee..e28d6792730 100644 --- a/CVE-2019/CVE-2019-157xx/CVE-2019-15790.json +++ b/CVE-2019/CVE-2019-157xx/CVE-2019-15790.json @@ -2,8 +2,8 @@ "id": "CVE-2019-15790", "sourceIdentifier": "security@ubuntu.com", "published": "2020-04-28T00:15:12.913", - "lastModified": "2020-05-14T00:58:57.443", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:11.920", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -158,6 +158,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html", + "source": "security@ubuntu.com" + }, { "url": "https://bugs.launchpad.net/apport/+bug/1854237", "source": "security@ubuntu.com", diff --git a/CVE-2019/CVE-2019-174xx/CVE-2019-17498.json b/CVE-2019/CVE-2019-174xx/CVE-2019-17498.json index 6e23349c5bb..5842ce14b77 100644 --- a/CVE-2019/CVE-2019-174xx/CVE-2019-17498.json +++ b/CVE-2019/CVE-2019-174xx/CVE-2019-17498.json @@ -2,8 +2,8 @@ "id": "CVE-2019-17498", "sourceIdentifier": "cve@mitre.org", "published": "2019-10-21T22:15:10.523", - "lastModified": "2022-10-27T21:08:32.800", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:12.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -224,6 +224,10 @@ "Third Party Advisory" ] }, + { + "url": "http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html", + "source": "cve@mitre.org" + }, { "url": "https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/", "source": "cve@mitre.org", diff --git a/CVE-2019/CVE-2019-35xx/CVE-2019-3560.json b/CVE-2019/CVE-2019-35xx/CVE-2019-3560.json index c472f2a6b25..701966bfd77 100644 --- a/CVE-2019/CVE-2019-35xx/CVE-2019-3560.json +++ b/CVE-2019/CVE-2019-35xx/CVE-2019-3560.json @@ -2,8 +2,8 @@ "id": "CVE-2019-3560", "sourceIdentifier": "cve-assign@fb.com", "published": "2019-04-29T16:29:00.813", - "lastModified": "2020-10-16T18:04:29.860", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:12.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -108,6 +108,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html", + "source": "cve-assign@fb.com" + }, { "url": "https://github.com/facebookincubator/fizz/commit/40bbb161e72fb609608d53b9d64c56bb961a6ee2", "source": "cve-assign@fb.com", diff --git a/CVE-2019/CVE-2019-38xx/CVE-2019-3828.json b/CVE-2019/CVE-2019-38xx/CVE-2019-3828.json index 9c56489d62a..305d4cc72a5 100644 --- a/CVE-2019/CVE-2019-38xx/CVE-2019-3828.json +++ b/CVE-2019/CVE-2019-38xx/CVE-2019-3828.json @@ -2,8 +2,8 @@ "id": "CVE-2019-3828", "sourceIdentifier": "secalert@redhat.com", "published": "2019-03-27T13:29:01.617", - "lastModified": "2020-05-21T14:55:31.317", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:12.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -162,6 +162,10 @@ "Third Party Advisory" ] }, + { + "url": "http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2019:3744", "source": "secalert@redhat.com", diff --git a/CVE-2019/CVE-2019-69xx/CVE-2019-6986.json b/CVE-2019/CVE-2019-69xx/CVE-2019-6986.json index c139915b28c..692009f8500 100644 --- a/CVE-2019/CVE-2019-69xx/CVE-2019-6986.json +++ b/CVE-2019/CVE-2019-69xx/CVE-2019-6986.json @@ -2,8 +2,8 @@ "id": "CVE-2019-6986", "sourceIdentifier": "cve@mitre.org", "published": "2019-01-28T15:29:00.337", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:12.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -97,6 +97,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172838/VIVO-SPARQL-Injection.html", + "source": "cve@mitre.org" + }, { "url": "https://github.com/kevinbackhouse/SecurityExploits/tree/0ec74459ac53685a7959ed58d580ef8abece3685/vivo-project", "source": "cve@mitre.org", diff --git a/CVE-2019/CVE-2019-73xx/CVE-2019-7307.json b/CVE-2019/CVE-2019-73xx/CVE-2019-7307.json index f46f8e06975..f1ca8f7ed1e 100644 --- a/CVE-2019/CVE-2019-73xx/CVE-2019-7307.json +++ b/CVE-2019/CVE-2019-73xx/CVE-2019-7307.json @@ -2,8 +2,8 @@ "id": "CVE-2019-7307", "sourceIdentifier": "security@ubuntu.com", "published": "2019-08-29T15:15:11.370", - "lastModified": "2023-02-03T14:33:45.937", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:12.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -245,6 +245,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html", + "source": "security@ubuntu.com" + }, { "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/apport/%2Bbug/1830858", "source": "security@ubuntu.com", diff --git a/CVE-2020/CVE-2020-120xx/CVE-2020-12049.json b/CVE-2020/CVE-2020-120xx/CVE-2020-12049.json index bcae1146a7d..1765dcd5708 100644 --- a/CVE-2020/CVE-2020-120xx/CVE-2020-12049.json +++ b/CVE-2020/CVE-2020-120xx/CVE-2020-12049.json @@ -2,8 +2,8 @@ "id": "CVE-2020-12049", "sourceIdentifier": "cve@mitre.org", "published": "2020-06-08T17:15:09.910", - "lastModified": "2021-03-04T21:17:19.483", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:13.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -135,6 +135,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172840/D-Bus-File-Descriptor-Leak-Denial-Of-Service.html", + "source": "cve@mitre.org" + }, { "url": "http://www.openwall.com/lists/oss-security/2020/06/04/3", "source": "cve@mitre.org", diff --git a/CVE-2020/CVE-2020-128xx/CVE-2020-12861.json b/CVE-2020/CVE-2020-128xx/CVE-2020-12861.json index f4d91dbbacd..94f5afee19e 100644 --- a/CVE-2020/CVE-2020-128xx/CVE-2020-12861.json +++ b/CVE-2020/CVE-2020-128xx/CVE-2020-12861.json @@ -2,8 +2,8 @@ "id": "CVE-2020-12861", "sourceIdentifier": "cve@mitre.org", "published": "2020-06-24T13:15:10.957", - "lastModified": "2022-11-21T14:28:04.157", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:13.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -145,6 +145,10 @@ "Third Party Advisory" ] }, + { + "url": "http://packetstormsecurity.com/files/172841/SANE-Backends-Memory-Corruption-Code-Execution.html", + "source": "cve@mitre.org" + }, { "url": "https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html", "source": "cve@mitre.org", diff --git a/CVE-2020/CVE-2020-159xx/CVE-2020-15972.json b/CVE-2020/CVE-2020-159xx/CVE-2020-15972.json index dcdbbe83b84..d00846019ad 100644 --- a/CVE-2020/CVE-2020-159xx/CVE-2020-15972.json +++ b/CVE-2020/CVE-2020-159xx/CVE-2020-15972.json @@ -2,8 +2,8 @@ "id": "CVE-2020-15972", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2020-11-03T03:15:13.010", - "lastModified": "2021-07-21T11:39:23.747", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:14.410", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -151,6 +151,10 @@ "Third Party Advisory" ] }, + { + "url": "http://packetstormsecurity.com/files/172842/Chrome-Renderer-Remote-Code-Execution.html", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "source": "chrome-cve-admin@google.com", diff --git a/CVE-2020/CVE-2020-281xx/CVE-2020-28188.json b/CVE-2020/CVE-2020-281xx/CVE-2020-28188.json index c2f79d16c46..0ebcfe489a3 100644 --- a/CVE-2020/CVE-2020-281xx/CVE-2020-28188.json +++ b/CVE-2020/CVE-2020-281xx/CVE-2020-28188.json @@ -2,8 +2,8 @@ "id": "CVE-2020-28188", "sourceIdentifier": "cve@mitre.org", "published": "2020-12-24T15:15:13.343", - "lastModified": "2021-02-02T16:43:54.177", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:14.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -94,6 +94,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172880/TerraMaster-TOS-4.2.06-Remote-Code-Execution.html", + "source": "cve@mitre.org" + }, { "url": "https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/", "source": "cve@mitre.org", diff --git a/CVE-2020/CVE-2020-356xx/CVE-2020-35665.json b/CVE-2020/CVE-2020-356xx/CVE-2020-35665.json index f7364aca252..f670fd8ca18 100644 --- a/CVE-2020/CVE-2020-356xx/CVE-2020-35665.json +++ b/CVE-2020/CVE-2020-356xx/CVE-2020-35665.json @@ -2,8 +2,8 @@ "id": "CVE-2020-35665", "sourceIdentifier": "cve@mitre.org", "published": "2020-12-23T20:15:12.880", - "lastModified": "2022-04-26T16:12:59.107", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:15.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -94,6 +94,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172880/TerraMaster-TOS-4.2.06-Remote-Code-Execution.html", + "source": "cve@mitre.org" + }, { "url": "https://www.exploit-db.com/exploits/49330", "source": "cve@mitre.org", diff --git a/CVE-2020/CVE-2020-64xx/CVE-2020-6449.json b/CVE-2020/CVE-2020-64xx/CVE-2020-6449.json index 45709138840..5012265d152 100644 --- a/CVE-2020/CVE-2020-64xx/CVE-2020-6449.json +++ b/CVE-2020/CVE-2020-64xx/CVE-2020-6449.json @@ -2,8 +2,8 @@ "id": "CVE-2020-6449", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2020-03-23T16:15:17.657", - "lastModified": "2022-03-31T17:10:20.140", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:16.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -180,6 +180,10 @@ "Third Party Advisory" ] }, + { + "url": "http://packetstormsecurity.com/files/172843/Chrome-WebAudio-Use-After-Free.html", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html", "source": "chrome-cve-admin@google.com", diff --git a/CVE-2021/CVE-2021-19xx/CVE-2021-1940.json b/CVE-2021/CVE-2021-19xx/CVE-2021-1940.json index cf43bb022b0..2f1d97e0c7f 100644 --- a/CVE-2021/CVE-2021-19xx/CVE-2021-1940.json +++ b/CVE-2021/CVE-2021-19xx/CVE-2021-1940.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1940", "sourceIdentifier": "product-security@qualcomm.com", "published": "2021-07-13T06:15:08.797", - "lastModified": "2021-07-15T20:15:55.317", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:17.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -1907,6 +1907,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html", + "source": "product-security@qualcomm.com" + }, { "url": "https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin", "source": "product-security@qualcomm.com", diff --git a/CVE-2021/CVE-2021-19xx/CVE-2021-1968.json b/CVE-2021/CVE-2021-19xx/CVE-2021-1968.json index 6af5470959d..4aa4d6092c8 100644 --- a/CVE-2021/CVE-2021-19xx/CVE-2021-1968.json +++ b/CVE-2021/CVE-2021-19xx/CVE-2021-1968.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1968", "sourceIdentifier": "product-security@qualcomm.com", "published": "2021-10-20T07:15:07.847", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:24.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -1772,6 +1772,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html", + "source": "product-security@qualcomm.com" + }, { "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin", "source": "product-security@qualcomm.com", diff --git a/CVE-2021/CVE-2021-19xx/CVE-2021-1969.json b/CVE-2021/CVE-2021-19xx/CVE-2021-1969.json index e0cad7a61e2..ea333457617 100644 --- a/CVE-2021/CVE-2021-19xx/CVE-2021-1969.json +++ b/CVE-2021/CVE-2021-19xx/CVE-2021-1969.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1969", "sourceIdentifier": "product-security@qualcomm.com", "published": "2021-10-20T07:15:07.907", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:33.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -1772,6 +1772,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html", + "source": "product-security@qualcomm.com" + }, { "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin", "source": "product-security@qualcomm.com", diff --git a/CVE-2021/CVE-2021-244xx/CVE-2021-24499.json b/CVE-2021/CVE-2021-244xx/CVE-2021-24499.json index 870c33bb09f..e383e2a18fa 100644 --- a/CVE-2021/CVE-2021-244xx/CVE-2021-24499.json +++ b/CVE-2021/CVE-2021-244xx/CVE-2021-24499.json @@ -2,8 +2,8 @@ "id": "CVE-2021-24499", "sourceIdentifier": "contact@wpscan.com", "published": "2021-08-09T10:15:07.397", - "lastModified": "2021-09-21T17:10:47.707", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:43.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -104,6 +104,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172876/WordPress-Workreap-2.2.2-Shell-Upload.html", + "source": "contact@wpscan.com" + }, { "url": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/", "source": "contact@wpscan.com", diff --git a/CVE-2021/CVE-2021-305xx/CVE-2021-30528.json b/CVE-2021/CVE-2021-305xx/CVE-2021-30528.json index ee38ff29442..711bd55bcfb 100644 --- a/CVE-2021/CVE-2021-305xx/CVE-2021-30528.json +++ b/CVE-2021/CVE-2021-305xx/CVE-2021-30528.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30528", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-06-07T20:15:08.553", - "lastModified": "2021-12-01T20:29:35.353", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:46.957", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -127,6 +127,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172844/Chrome-Sandbox-Escape.html", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html", "source": "chrome-cve-admin@google.com", diff --git a/CVE-2021/CVE-2021-306xx/CVE-2021-30632.json b/CVE-2021/CVE-2021-306xx/CVE-2021-30632.json index a698eee467e..47db2bcad1e 100644 --- a/CVE-2021/CVE-2021-306xx/CVE-2021-30632.json +++ b/CVE-2021/CVE-2021-306xx/CVE-2021-30632.json @@ -2,12 +2,12 @@ "id": "CVE-2021-30632", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-10-08T21:15:07.603", - "lastModified": "2021-11-23T22:04:16.607", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:51.953", + "vulnStatus": "Modified", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Google Chrome Out-of-bounds write", + "cisaVulnerabilityName": "Google Chromium V8 Out-of-Bounds Write Vulnerability", "descriptions": [ { "lang": "en", @@ -118,6 +118,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html", "source": "chrome-cve-admin@google.com", diff --git a/CVE-2021/CVE-2021-35xx/CVE-2021-3560.json b/CVE-2021/CVE-2021-35xx/CVE-2021-3560.json index 8ff3457a980..c8551f55a9a 100644 --- a/CVE-2021/CVE-2021-35xx/CVE-2021-3560.json +++ b/CVE-2021/CVE-2021-35xx/CVE-2021-3560.json @@ -2,8 +2,12 @@ "id": "CVE-2021-3560", "sourceIdentifier": "secalert@redhat.com", "published": "2022-02-16T19:15:08.450", - "lastModified": "2022-07-11T18:05:37.150", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:58.090", + "vulnStatus": "Modified", + "cisaExploitAdd": "2023-05-12", + "cisaActionDue": "2023-06-02", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Red Hat Polkit Incorrect Authorization Vulnerability", "descriptions": [ { "lang": "en", @@ -201,6 +205,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html", + "source": "secalert@redhat.com" + }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961710", "source": "secalert@redhat.com", diff --git a/CVE-2021/CVE-2021-379xx/CVE-2021-37975.json b/CVE-2021/CVE-2021-379xx/CVE-2021-37975.json index 89eb61044c7..3799a81db87 100644 --- a/CVE-2021/CVE-2021-379xx/CVE-2021-37975.json +++ b/CVE-2021/CVE-2021-379xx/CVE-2021-37975.json @@ -2,12 +2,12 @@ "id": "CVE-2021-37975", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-10-08T22:15:08.373", - "lastModified": "2022-02-19T04:35:00.493", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:15:55.357", + "vulnStatus": "Modified", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Google Chrome Use-After-Free Vulnerability", + "cisaVulnerabilityName": "Google Chromium V8 Use-After-Free Vulnerability", "descriptions": [ { "lang": "en", @@ -143,6 +143,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172847/Chrome-V8-Logic-Bug-Use-After-Free.html", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html", "source": "chrome-cve-admin@google.com", diff --git a/CVE-2021/CVE-2021-39xx/CVE-2021-3939.json b/CVE-2021/CVE-2021-39xx/CVE-2021-3939.json index 299ee9aed80..86d38c74154 100644 --- a/CVE-2021/CVE-2021-39xx/CVE-2021-3939.json +++ b/CVE-2021/CVE-2021-39xx/CVE-2021-3939.json @@ -2,8 +2,8 @@ "id": "CVE-2021-3939", "sourceIdentifier": "security@ubuntu.com", "published": "2021-11-17T04:15:06.977", - "lastModified": "2021-11-19T16:30:21.643", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:16:02.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -164,6 +164,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172848/Ubuntu-accountsservice-Double-Free-Memory-Corruption.html", + "source": "security@ubuntu.com" + }, { "url": "https://bugs.launchpad.net/ubuntu/+source/accountsservice/+bug/1950149", "source": "security@ubuntu.com", diff --git a/CVE-2021/CVE-2021-41xx/CVE-2021-4115.json b/CVE-2021/CVE-2021-41xx/CVE-2021-4115.json index f9613e1163d..01c72b743e1 100644 --- a/CVE-2021/CVE-2021-41xx/CVE-2021-4115.json +++ b/CVE-2021/CVE-2021-41xx/CVE-2021-4115.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4115", "sourceIdentifier": "secalert@redhat.com", "published": "2022-02-21T22:15:07.743", - "lastModified": "2022-08-09T00:37:29.617", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:16:13.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -188,6 +188,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172849/polkit-File-Descriptor-Exhaustion.html", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/cve-2021-4115", "source": "secalert@redhat.com", diff --git a/CVE-2021/CVE-2021-458xx/CVE-2021-45837.json b/CVE-2021/CVE-2021-458xx/CVE-2021-45837.json index f481af7548f..7cf12af08c2 100644 --- a/CVE-2021/CVE-2021-458xx/CVE-2021-45837.json +++ b/CVE-2021/CVE-2021-458xx/CVE-2021-45837.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45837", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-25T11:15:07.103", - "lastModified": "2022-05-05T16:44:03.937", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:16:06.817", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -110,6 +110,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html", + "source": "cve@mitre.org" + }, { "url": "https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/", "source": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-458xx/CVE-2021-45839.json b/CVE-2021/CVE-2021-458xx/CVE-2021-45839.json index de05ca0713d..65b2bcc73f5 100644 --- a/CVE-2021/CVE-2021-458xx/CVE-2021-45839.json +++ b/CVE-2021/CVE-2021-458xx/CVE-2021-45839.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45839", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-25T11:15:07.147", - "lastModified": "2022-05-05T17:18:09.507", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:16:10.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -110,6 +110,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html", + "source": "cve@mitre.org" + }, { "url": "https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/", "source": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-458xx/CVE-2021-45841.json b/CVE-2021/CVE-2021-458xx/CVE-2021-45841.json index de94d074e3b..fcd98ded602 100644 --- a/CVE-2021/CVE-2021-458xx/CVE-2021-45841.json +++ b/CVE-2021/CVE-2021-458xx/CVE-2021-45841.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45841", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-25T11:15:07.237", - "lastModified": "2022-05-05T17:08:56.933", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:16:12.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -110,6 +110,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html", + "source": "cve@mitre.org" + }, { "url": "https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-11xx/CVE-2022-1134.json b/CVE-2022/CVE-2022-11xx/CVE-2022-1134.json index 9667e4b8257..416a61949be 100644 --- a/CVE-2022/CVE-2022-11xx/CVE-2022-1134.json +++ b/CVE-2022/CVE-2022-11xx/CVE-2022-1134.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1134", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-07-23T00:15:08.787", - "lastModified": "2022-10-25T18:52:43.163", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:16:15.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -69,6 +69,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172851/Chrome-Renderer-Type-Confusion-Remote-Code-Execution.html", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_29.html", "source": "chrome-cve-admin@google.com", diff --git a/CVE-2022/CVE-2022-201xx/CVE-2022-20186.json b/CVE-2022/CVE-2022-201xx/CVE-2022-20186.json index f55f7e679ad..dfeac441b75 100644 --- a/CVE-2022/CVE-2022-201xx/CVE-2022-20186.json +++ b/CVE-2022/CVE-2022-201xx/CVE-2022-20186.json @@ -2,8 +2,8 @@ "id": "CVE-2022-20186", "sourceIdentifier": "security@android.com", "published": "2022-06-15T14:15:12.730", - "lastModified": "2022-06-24T02:50:04.677", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:16:18.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -93,6 +93,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172852/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html", + "source": "security@android.com" + }, { "url": "https://source.android.com/security/bulletin/pixel/2022-06-01", "source": "security@android.com", diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22057.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22057.json index 0d704902912..afb1ef56868 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22057.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22057.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22057", "sourceIdentifier": "product-security@qualcomm.com", "published": "2022-06-14T10:15:18.763", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:16:22.287", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -2258,6 +2258,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172850/Qualcomm-kgsl-Driver-Use-After-Free.html", + "source": "product-security@qualcomm.com" + }, { "url": "https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin", "source": "product-security@qualcomm.com", diff --git a/CVE-2022/CVE-2022-256xx/CVE-2022-25664.json b/CVE-2022/CVE-2022-256xx/CVE-2022-25664.json index 91aa4482371..3adf15f8c78 100644 --- a/CVE-2022/CVE-2022-256xx/CVE-2022-25664.json +++ b/CVE-2022/CVE-2022-256xx/CVE-2022-25664.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25664", "sourceIdentifier": "product-security@qualcomm.com", "published": "2022-10-19T11:15:10.387", - "lastModified": "2023-04-19T17:10:55.030", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:16:31.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -3043,6 +3043,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172853/Qualcomm-Adreno-GPU-Information-Leak.html", + "source": "product-security@qualcomm.com" + }, { "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2022-bulletin", "source": "product-security@qualcomm.com", diff --git a/CVE-2022/CVE-2022-381xx/CVE-2022-38181.json b/CVE-2022/CVE-2022-381xx/CVE-2022-38181.json index 160e87f8d0e..9a434244560 100644 --- a/CVE-2022/CVE-2022-381xx/CVE-2022-38181.json +++ b/CVE-2022/CVE-2022-381xx/CVE-2022-38181.json @@ -2,8 +2,12 @@ "id": "CVE-2022-38181", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-25T19:15:11.487", - "lastModified": "2023-03-01T18:11:45.733", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:16:46.037", + "vulnStatus": "Modified", + "cisaExploitAdd": "2023-03-30", + "cisaActionDue": "2023-04-20", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability", "descriptions": [ { "lang": "en", @@ -94,6 +98,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html", + "source": "cve@mitre.org" + }, { "url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46395.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46395.json index 54e92e240b1..4ece1538596 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46395.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46395.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46395", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-06T14:15:09.367", - "lastModified": "2023-03-13T17:48:08.393", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:16:49.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -85,6 +85,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172855/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html", + "source": "cve@mitre.org" + }, { "url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21839.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21839.json index a4117b578a1..53b0e30581f 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21839.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21839.json @@ -2,8 +2,12 @@ "id": "CVE-2023-21839", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-01-18T00:15:13.450", - "lastModified": "2023-01-24T19:28:40.867", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:16:53.787", + "vulnStatus": "Modified", + "cisaExploitAdd": "2023-05-01", + "cisaActionDue": "2023-05-22", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Oracle WebLogic Server Unspecified Vulnerability", "descriptions": [ { "lang": "en", @@ -74,6 +78,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpujan2023.html", "source": "secalert_us@oracle.com", diff --git a/CVE-2023/CVE-2023-219xx/CVE-2023-21931.json b/CVE-2023/CVE-2023-219xx/CVE-2023-21931.json index d0fea51343e..28e8402bc1c 100644 --- a/CVE-2023/CVE-2023-219xx/CVE-2023-21931.json +++ b/CVE-2023/CVE-2023-219xx/CVE-2023-21931.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21931", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-04-18T20:15:13.963", - "lastModified": "2023-04-20T15:02:26.770", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:17:03.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -74,6 +74,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html", + "source": "secalert_us@oracle.com" + }, { "url": "https://www.oracle.com/security-alerts/cpuapr2023.html", "source": "secalert_us@oracle.com", diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2283.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2283.json index 8e3343b597a..7538b590723 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2283.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2283.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2283", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-26T18:15:13.770", - "lastModified": "2023-06-06T14:54:27.843", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-12T07:17:05.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -118,6 +118,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-2283", "source": "secalert@redhat.com", diff --git a/README.md b/README.md index c690cdc4a7e..598adf79da0 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-12T06:00:25.083848+00:00 +2023-06-12T08:00:23.939569+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-12T05:15:09.400000+00:00 +2023-06-12T07:17:05.597000+00:00 ``` ### Last Data Feed Release @@ -29,20 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -217410 +217411 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -* [CVE-2023-26133](CVE-2023/CVE-2023-261xx/CVE-2023-26133.json) (`2023-06-12T05:15:09.400`) +* [CVE-2015-10118](CVE-2015/CVE-2015-101xx/CVE-2015-10118.json) (`2023-06-12T07:15:09.000`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `51` +* [CVE-2020-28188](CVE-2020/CVE-2020-281xx/CVE-2020-28188.json) (`2023-06-12T07:15:14.877`) +* [CVE-2020-35665](CVE-2020/CVE-2020-356xx/CVE-2020-35665.json) (`2023-06-12T07:15:15.967`) +* [CVE-2020-6449](CVE-2020/CVE-2020-64xx/CVE-2020-6449.json) (`2023-06-12T07:15:16.697`) +* [CVE-2021-1940](CVE-2021/CVE-2021-19xx/CVE-2021-1940.json) (`2023-06-12T07:15:17.517`) +* [CVE-2021-1968](CVE-2021/CVE-2021-19xx/CVE-2021-1968.json) (`2023-06-12T07:15:24.900`) +* [CVE-2021-1969](CVE-2021/CVE-2021-19xx/CVE-2021-1969.json) (`2023-06-12T07:15:33.443`) +* [CVE-2021-24499](CVE-2021/CVE-2021-244xx/CVE-2021-24499.json) (`2023-06-12T07:15:43.480`) +* [CVE-2021-30528](CVE-2021/CVE-2021-305xx/CVE-2021-30528.json) (`2023-06-12T07:15:46.957`) +* [CVE-2021-30632](CVE-2021/CVE-2021-306xx/CVE-2021-30632.json) (`2023-06-12T07:15:51.953`) +* [CVE-2021-37975](CVE-2021/CVE-2021-379xx/CVE-2021-37975.json) (`2023-06-12T07:15:55.357`) +* [CVE-2021-3560](CVE-2021/CVE-2021-35xx/CVE-2021-3560.json) (`2023-06-12T07:15:58.090`) +* [CVE-2021-3939](CVE-2021/CVE-2021-39xx/CVE-2021-3939.json) (`2023-06-12T07:16:02.547`) +* [CVE-2021-45837](CVE-2021/CVE-2021-458xx/CVE-2021-45837.json) (`2023-06-12T07:16:06.817`) +* [CVE-2021-45839](CVE-2021/CVE-2021-458xx/CVE-2021-45839.json) (`2023-06-12T07:16:10.573`) +* [CVE-2021-45841](CVE-2021/CVE-2021-458xx/CVE-2021-45841.json) (`2023-06-12T07:16:12.170`) +* [CVE-2021-4115](CVE-2021/CVE-2021-41xx/CVE-2021-4115.json) (`2023-06-12T07:16:13.773`) +* [CVE-2022-1134](CVE-2022/CVE-2022-11xx/CVE-2022-1134.json) (`2023-06-12T07:16:15.503`) +* [CVE-2022-20186](CVE-2022/CVE-2022-201xx/CVE-2022-20186.json) (`2023-06-12T07:16:18.807`) +* [CVE-2022-22057](CVE-2022/CVE-2022-220xx/CVE-2022-22057.json) (`2023-06-12T07:16:22.287`) +* [CVE-2022-25664](CVE-2022/CVE-2022-256xx/CVE-2022-25664.json) (`2023-06-12T07:16:31.763`) +* [CVE-2022-38181](CVE-2022/CVE-2022-381xx/CVE-2022-38181.json) (`2023-06-12T07:16:46.037`) +* [CVE-2022-46395](CVE-2022/CVE-2022-463xx/CVE-2022-46395.json) (`2023-06-12T07:16:49.167`) +* [CVE-2023-21839](CVE-2023/CVE-2023-218xx/CVE-2023-21839.json) (`2023-06-12T07:16:53.787`) +* [CVE-2023-21931](CVE-2023/CVE-2023-219xx/CVE-2023-21931.json) (`2023-06-12T07:17:03.413`) +* [CVE-2023-2283](CVE-2023/CVE-2023-22xx/CVE-2023-2283.json) (`2023-06-12T07:17:05.597`) ## Download and Usage