Auto-Update: 2023-06-12T08:00:23.939569+00:00

This commit is contained in:
cad-safe-bot 2023-06-12 08:00:27 +00:00
parent a45f13b3f4
commit e05f5b7b1d
53 changed files with 435 additions and 106 deletions

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2015-10118",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-12T07:15:09.000",
"lastModified": "2023-06-12T07:15:09.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in cchetanonline WP-CopyProtect up to 3.0.0. This vulnerability affects the function CopyProtect_options_page of the file wp-copyprotect.php. The manipulation of the argument CopyProtect_nrc_text leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 3.1.0 is able to address this issue. The patch is identified as 8b8fe4102886b326330dc1ff06b17313fb10aee5. It is recommended to upgrade the affected component. VDB-231202 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/wp-plugins/wp-copyprotect/commit/8b8fe4102886b326330dc1ff06b17313fb10aee5",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.231202",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.231202",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-0141", "id": "CVE-2017-0141",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2017-03-17T00:59:03.947", "published": "2017-03-17T00:59:03.947",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-06-12T07:15:09.250",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -120,6 +120,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172826/Microsoft-ChakaCore-Remote-Code-Execution.html",
"source": "secure@microsoft.com"
},
{ {
"url": "http://www.securityfocus.com/bid/96685", "url": "http://www.securityfocus.com/bid/96685",
"source": "secure@microsoft.com", "source": "secure@microsoft.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-13782", "id": "CVE-2017-13782",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2017-11-13T03:29:00.223", "published": "2017-11-13T03:29:00.223",
"lastModified": "2017-11-27T16:26:53.010", "lastModified": "2023-06-12T07:15:09.497",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -94,6 +94,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172827/Apple-XNU-Kernel-Memory-Exposure.html",
"source": "product-security@apple.com"
},
{ {
"url": "http://www.securitytracker.com/id/1039710", "url": "http://www.securitytracker.com/id/1039710",
"source": "product-security@apple.com", "source": "product-security@apple.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-13904", "id": "CVE-2017-13904",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2018-04-03T06:29:01.187", "published": "2018-04-03T06:29:01.187",
"lastModified": "2019-03-08T16:06:35.373", "lastModified": "2023-06-12T07:15:09.640",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -112,6 +112,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172828/Apple-packet-mangler-Remote-Code-Execution.html",
"source": "product-security@apple.com"
},
{ {
"url": "https://support.apple.com/HT208325", "url": "https://support.apple.com/HT208325",
"source": "product-security@apple.com", "source": "product-security@apple.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-1000140", "id": "CVE-2018-1000140",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-03-23T21:29:00.647", "published": "2018-03-23T21:29:00.647",
"lastModified": "2020-08-24T17:37:01.140", "lastModified": "2023-06-12T07:15:09.813",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -244,6 +244,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172829/librelp-Remote-Code-Execution.html",
"source": "cve@mitre.org"
},
{ {
"url": "https://access.redhat.com/errata/RHSA-2018:1223", "url": "https://access.redhat.com/errata/RHSA-2018:1223",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,12 +2,12 @@
"id": "CVE-2018-11776", "id": "CVE-2018-11776",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2018-08-22T13:29:00.753", "published": "2018-08-22T13:29:00.753",
"lastModified": "2020-07-15T03:15:21.607", "lastModified": "2023-06-12T07:15:10.077",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03", "cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03", "cisaActionDue": "2022-05-03",
"cisaRequiredAction": "Apply updates per vendor instructions.", "cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apache Struts 2.3 to 2.3.34 and 2.5 to 2.5.16 Remote Code Execution Vulnerability", "cisaVulnerabilityName": "Apache Struts Remote Code Execution Vulnerability",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -106,6 +106,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html",
"source": "security@apache.org"
},
{ {
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt",
"source": "security@apache.org", "source": "security@apache.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-4249", "id": "CVE-2018-4249",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2018-06-08T18:29:02.743", "published": "2018-06-08T18:29:02.743",
"lastModified": "2020-08-24T17:37:01.140", "lastModified": "2023-06-12T07:15:10.247",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -116,6 +116,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172828/Apple-packet-mangler-Remote-Code-Execution.html",
"source": "product-security@apple.com"
},
{ {
"url": "http://www.securitytracker.com/id/1041027", "url": "http://www.securitytracker.com/id/1041027",
"source": "product-security@apple.com", "source": "product-security@apple.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-4259", "id": "CVE-2018-4259",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2019-04-03T18:29:03.313", "published": "2019-04-03T18:29:03.313",
"lastModified": "2019-04-04T14:12:47.163", "lastModified": "2023-06-12T07:15:10.417",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -94,6 +94,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html",
"source": "product-security@apple.com"
},
{ {
"url": "https://support.apple.com/kb/HT208937", "url": "https://support.apple.com/kb/HT208937",
"source": "product-security@apple.com", "source": "product-security@apple.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-4286", "id": "CVE-2018-4286",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2019-04-03T18:29:05.457", "published": "2019-04-03T18:29:05.457",
"lastModified": "2019-04-04T19:54:49.690", "lastModified": "2023-06-12T07:15:10.537",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -94,6 +94,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html",
"source": "product-security@apple.com"
},
{ {
"url": "https://support.apple.com/kb/HT208937", "url": "https://support.apple.com/kb/HT208937",
"source": "product-security@apple.com", "source": "product-security@apple.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-4287", "id": "CVE-2018-4287",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2019-04-03T18:29:05.503", "published": "2019-04-03T18:29:05.503",
"lastModified": "2019-04-04T19:57:18.380", "lastModified": "2023-06-12T07:15:10.643",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -94,6 +94,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html",
"source": "product-security@apple.com"
},
{ {
"url": "https://support.apple.com/kb/HT208937", "url": "https://support.apple.com/kb/HT208937",
"source": "product-security@apple.com", "source": "product-security@apple.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-4288", "id": "CVE-2018-4288",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2019-04-03T18:29:05.550", "published": "2019-04-03T18:29:05.550",
"lastModified": "2019-04-04T18:34:27.283", "lastModified": "2023-06-12T07:15:10.767",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -94,6 +94,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html",
"source": "product-security@apple.com"
},
{ {
"url": "https://support.apple.com/kb/HT208937", "url": "https://support.apple.com/kb/HT208937",
"source": "product-security@apple.com", "source": "product-security@apple.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-4291", "id": "CVE-2018-4291",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2019-04-03T18:29:05.690", "published": "2019-04-03T18:29:05.690",
"lastModified": "2019-04-04T18:23:15.267", "lastModified": "2023-06-12T07:15:10.863",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -94,6 +94,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172831/macOS-NFS-Client-Buffer-Overflow.html",
"source": "product-security@apple.com"
},
{ {
"url": "https://support.apple.com/kb/HT208937", "url": "https://support.apple.com/kb/HT208937",
"source": "product-security@apple.com", "source": "product-security@apple.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-4407", "id": "CVE-2018-4407",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2019-04-03T18:29:13.610", "published": "2019-04-03T18:29:13.610",
"lastModified": "2019-04-05T14:04:05.367", "lastModified": "2023-06-12T07:15:10.957",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -112,6 +112,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172832/iOS-11.4.1-macOS-10.13.6-icmp_error-Heap-Buffer-Overflow.html",
"source": "product-security@apple.com"
},
{ {
"url": "https://support.apple.com/kb/HT209106", "url": "https://support.apple.com/kb/HT209106",
"source": "product-security@apple.com", "source": "product-security@apple.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-5388", "id": "CVE-2018-5388",
"sourceIdentifier": "cret@cert.org", "sourceIdentifier": "cret@cert.org",
"published": "2018-05-31T13:29:00.220", "published": "2018-05-31T13:29:00.220",
"lastModified": "2019-10-09T23:41:16.813", "lastModified": "2023-06-12T07:15:11.077",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -161,6 +161,10 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00047.html", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00047.html",
"source": "cret@cert.org" "source": "cret@cert.org"
}, },
{
"url": "http://packetstormsecurity.com/files/172833/strongSwan-VPN-Charon-Server-Buffer-Overflow.html",
"source": "cret@cert.org"
},
{ {
"url": "http://www.kb.cert.org/vuls/id/338343", "url": "http://www.kb.cert.org/vuls/id/338343",
"source": "cret@cert.org", "source": "cret@cert.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-11476", "id": "CVE-2019-11476",
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2019-08-29T15:15:10.950", "published": "2019-08-29T15:15:10.950",
"lastModified": "2019-10-09T23:45:24.917", "lastModified": "2023-06-12T07:15:11.240",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -138,6 +138,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html",
"source": "security@ubuntu.com"
},
{ {
"url": "https://bugs.launchpad.net/ubuntu/%2Bsource/whoopsie/%2Bbug/1830863", "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/whoopsie/%2Bbug/1830863",
"source": "security@ubuntu.com", "source": "security@ubuntu.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-11481", "id": "CVE-2019-11481",
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2020-02-08T05:15:12.527", "published": "2020-02-08T05:15:12.527",
"lastModified": "2020-02-12T21:21:33.557", "lastModified": "2023-06-12T07:15:11.413",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -148,6 +148,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html",
"source": "security@ubuntu.com"
},
{ {
"url": "https://usn.ubuntu.com/usn/usn-4171-1", "url": "https://usn.ubuntu.com/usn/usn-4171-1",
"source": "security@ubuntu.com", "source": "security@ubuntu.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-11484", "id": "CVE-2019-11484",
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2020-02-08T05:15:13.637", "published": "2020-02-08T05:15:13.637",
"lastModified": "2020-02-12T18:17:58.367", "lastModified": "2023-06-12T07:15:11.587",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -153,6 +153,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html",
"source": "security@ubuntu.com"
},
{ {
"url": "https://usn.ubuntu.com/usn/usn-4170-1", "url": "https://usn.ubuntu.com/usn/usn-4170-1",
"source": "security@ubuntu.com", "source": "security@ubuntu.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-13115", "id": "CVE-2019-13115",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-07-16T18:15:13.287", "published": "2019-07-16T18:15:13.287",
"lastModified": "2022-04-05T21:09:11.867", "lastModified": "2023-06-12T07:15:11.743",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -182,6 +182,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172834/libssh2-1.8.2-Out-Of-Bounds-Read.html",
"source": "cve@mitre.org"
},
{ {
"url": "https://blog.semmle.com/libssh2-integer-overflow/", "url": "https://blog.semmle.com/libssh2-integer-overflow/",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-15790", "id": "CVE-2019-15790",
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2020-04-28T00:15:12.913", "published": "2020-04-28T00:15:12.913",
"lastModified": "2020-05-14T00:58:57.443", "lastModified": "2023-06-12T07:15:11.920",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -158,6 +158,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html",
"source": "security@ubuntu.com"
},
{ {
"url": "https://bugs.launchpad.net/apport/+bug/1854237", "url": "https://bugs.launchpad.net/apport/+bug/1854237",
"source": "security@ubuntu.com", "source": "security@ubuntu.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-17498", "id": "CVE-2019-17498",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-10-21T22:15:10.523", "published": "2019-10-21T22:15:10.523",
"lastModified": "2022-10-27T21:08:32.800", "lastModified": "2023-06-12T07:15:12.123",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -224,6 +224,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html",
"source": "cve@mitre.org"
},
{ {
"url": "https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/", "url": "https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-3560", "id": "CVE-2019-3560",
"sourceIdentifier": "cve-assign@fb.com", "sourceIdentifier": "cve-assign@fb.com",
"published": "2019-04-29T16:29:00.813", "published": "2019-04-29T16:29:00.813",
"lastModified": "2020-10-16T18:04:29.860", "lastModified": "2023-06-12T07:15:12.343",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -108,6 +108,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html",
"source": "cve-assign@fb.com"
},
{ {
"url": "https://github.com/facebookincubator/fizz/commit/40bbb161e72fb609608d53b9d64c56bb961a6ee2", "url": "https://github.com/facebookincubator/fizz/commit/40bbb161e72fb609608d53b9d64c56bb961a6ee2",
"source": "cve-assign@fb.com", "source": "cve-assign@fb.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-3828", "id": "CVE-2019-3828",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2019-03-27T13:29:01.617", "published": "2019-03-27T13:29:01.617",
"lastModified": "2020-05-21T14:55:31.317", "lastModified": "2023-06-12T07:15:12.497",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -162,6 +162,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "http://packetstormsecurity.com/files/172837/Ansible-Fetch-Path-Traversal.html",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/errata/RHSA-2019:3744", "url": "https://access.redhat.com/errata/RHSA-2019:3744",
"source": "secalert@redhat.com", "source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-6986", "id": "CVE-2019-6986",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-01-28T15:29:00.337", "published": "2019-01-28T15:29:00.337",
"lastModified": "2020-08-24T17:37:01.140", "lastModified": "2023-06-12T07:15:12.750",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -97,6 +97,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172838/VIVO-SPARQL-Injection.html",
"source": "cve@mitre.org"
},
{ {
"url": "https://github.com/kevinbackhouse/SecurityExploits/tree/0ec74459ac53685a7959ed58d580ef8abece3685/vivo-project", "url": "https://github.com/kevinbackhouse/SecurityExploits/tree/0ec74459ac53685a7959ed58d580ef8abece3685/vivo-project",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-7307", "id": "CVE-2019-7307",
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2019-08-29T15:15:11.370", "published": "2019-08-29T15:15:11.370",
"lastModified": "2023-02-03T14:33:45.937", "lastModified": "2023-06-12T07:15:12.933",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -245,6 +245,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html",
"source": "security@ubuntu.com"
},
{ {
"url": "https://bugs.launchpad.net/ubuntu/%2Bsource/apport/%2Bbug/1830858", "url": "https://bugs.launchpad.net/ubuntu/%2Bsource/apport/%2Bbug/1830858",
"source": "security@ubuntu.com", "source": "security@ubuntu.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-12049", "id": "CVE-2020-12049",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-06-08T17:15:09.910", "published": "2020-06-08T17:15:09.910",
"lastModified": "2021-03-04T21:17:19.483", "lastModified": "2023-06-12T07:15:13.077",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -135,6 +135,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172840/D-Bus-File-Descriptor-Leak-Denial-Of-Service.html",
"source": "cve@mitre.org"
},
{ {
"url": "http://www.openwall.com/lists/oss-security/2020/06/04/3", "url": "http://www.openwall.com/lists/oss-security/2020/06/04/3",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-12861", "id": "CVE-2020-12861",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-06-24T13:15:10.957", "published": "2020-06-24T13:15:10.957",
"lastModified": "2022-11-21T14:28:04.157", "lastModified": "2023-06-12T07:15:13.933",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -145,6 +145,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "http://packetstormsecurity.com/files/172841/SANE-Backends-Memory-Corruption-Code-Execution.html",
"source": "cve@mitre.org"
},
{ {
"url": "https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html", "url": "https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-15972", "id": "CVE-2020-15972",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2020-11-03T03:15:13.010", "published": "2020-11-03T03:15:13.010",
"lastModified": "2021-07-21T11:39:23.747", "lastModified": "2023-06-12T07:15:14.410",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -151,6 +151,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "http://packetstormsecurity.com/files/172842/Chrome-Renderer-Remote-Code-Execution.html",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-28188", "id": "CVE-2020-28188",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-12-24T15:15:13.343", "published": "2020-12-24T15:15:13.343",
"lastModified": "2021-02-02T16:43:54.177", "lastModified": "2023-06-12T07:15:14.877",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -94,6 +94,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172880/TerraMaster-TOS-4.2.06-Remote-Code-Execution.html",
"source": "cve@mitre.org"
},
{ {
"url": "https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/", "url": "https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-35665", "id": "CVE-2020-35665",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-12-23T20:15:12.880", "published": "2020-12-23T20:15:12.880",
"lastModified": "2022-04-26T16:12:59.107", "lastModified": "2023-06-12T07:15:15.967",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -94,6 +94,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172880/TerraMaster-TOS-4.2.06-Remote-Code-Execution.html",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.exploit-db.com/exploits/49330", "url": "https://www.exploit-db.com/exploits/49330",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-6449", "id": "CVE-2020-6449",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2020-03-23T16:15:17.657", "published": "2020-03-23T16:15:17.657",
"lastModified": "2022-03-31T17:10:20.140", "lastModified": "2023-06-12T07:15:16.697",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -180,6 +180,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "http://packetstormsecurity.com/files/172843/Chrome-WebAudio-Use-After-Free.html",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html", "url": "https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1940", "id": "CVE-2021-1940",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2021-07-13T06:15:08.797", "published": "2021-07-13T06:15:08.797",
"lastModified": "2021-07-15T20:15:55.317", "lastModified": "2023-06-12T07:15:17.517",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -1907,6 +1907,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html",
"source": "product-security@qualcomm.com"
},
{ {
"url": "https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin", "url": "https://www.qualcomm.com/company/product-security/bulletins/july-2021-bulletin",
"source": "product-security@qualcomm.com", "source": "product-security@qualcomm.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1968", "id": "CVE-2021-1968",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2021-10-20T07:15:07.847", "published": "2021-10-20T07:15:07.847",
"lastModified": "2022-07-12T17:42:04.277", "lastModified": "2023-06-12T07:15:24.900",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -1772,6 +1772,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html",
"source": "product-security@qualcomm.com"
},
{ {
"url": "https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin", "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin",
"source": "product-security@qualcomm.com", "source": "product-security@qualcomm.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1969", "id": "CVE-2021-1969",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2021-10-20T07:15:07.907", "published": "2021-10-20T07:15:07.907",
"lastModified": "2022-07-12T17:42:04.277", "lastModified": "2023-06-12T07:15:33.443",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -1772,6 +1772,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html",
"source": "product-security@qualcomm.com"
},
{ {
"url": "https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin", "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin",
"source": "product-security@qualcomm.com", "source": "product-security@qualcomm.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24499", "id": "CVE-2021-24499",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2021-08-09T10:15:07.397", "published": "2021-08-09T10:15:07.397",
"lastModified": "2021-09-21T17:10:47.707", "lastModified": "2023-06-12T07:15:43.480",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -104,6 +104,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172876/WordPress-Workreap-2.2.2-Shell-Upload.html",
"source": "contact@wpscan.com"
},
{ {
"url": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/", "url": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/",
"source": "contact@wpscan.com", "source": "contact@wpscan.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-30528", "id": "CVE-2021-30528",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-06-07T20:15:08.553", "published": "2021-06-07T20:15:08.553",
"lastModified": "2021-12-01T20:29:35.353", "lastModified": "2023-06-12T07:15:46.957",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -127,6 +127,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172844/Chrome-Sandbox-Escape.html",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html", "url": "https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-30632", "id": "CVE-2021-30632",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-10-08T21:15:07.603", "published": "2021-10-08T21:15:07.603",
"lastModified": "2021-11-23T22:04:16.607", "lastModified": "2023-06-12T07:15:51.953",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03", "cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17", "cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.", "cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Google Chrome Out-of-bounds write", "cisaVulnerabilityName": "Google Chromium V8 Out-of-Bounds Write Vulnerability",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -118,6 +118,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,12 @@
"id": "CVE-2021-3560", "id": "CVE-2021-3560",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2022-02-16T19:15:08.450", "published": "2022-02-16T19:15:08.450",
"lastModified": "2022-07-11T18:05:37.150", "lastModified": "2023-06-12T07:15:58.090",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cisaExploitAdd": "2023-05-12",
"cisaActionDue": "2023-06-02",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Red Hat Polkit Incorrect Authorization Vulnerability",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -201,6 +205,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html",
"source": "secalert@redhat.com"
},
{ {
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961710", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961710",
"source": "secalert@redhat.com", "source": "secalert@redhat.com",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-37975", "id": "CVE-2021-37975",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-10-08T22:15:08.373", "published": "2021-10-08T22:15:08.373",
"lastModified": "2022-02-19T04:35:00.493", "lastModified": "2023-06-12T07:15:55.357",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03", "cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17", "cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.", "cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Google Chrome Use-After-Free Vulnerability", "cisaVulnerabilityName": "Google Chromium V8 Use-After-Free Vulnerability",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -143,6 +143,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172847/Chrome-V8-Logic-Bug-Use-After-Free.html",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html", "url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3939", "id": "CVE-2021-3939",
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2021-11-17T04:15:06.977", "published": "2021-11-17T04:15:06.977",
"lastModified": "2021-11-19T16:30:21.643", "lastModified": "2023-06-12T07:16:02.547",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -164,6 +164,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172848/Ubuntu-accountsservice-Double-Free-Memory-Corruption.html",
"source": "security@ubuntu.com"
},
{ {
"url": "https://bugs.launchpad.net/ubuntu/+source/accountsservice/+bug/1950149", "url": "https://bugs.launchpad.net/ubuntu/+source/accountsservice/+bug/1950149",
"source": "security@ubuntu.com", "source": "security@ubuntu.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-4115", "id": "CVE-2021-4115",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2022-02-21T22:15:07.743", "published": "2022-02-21T22:15:07.743",
"lastModified": "2022-08-09T00:37:29.617", "lastModified": "2023-06-12T07:16:13.773",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -188,6 +188,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172849/polkit-File-Descriptor-Exhaustion.html",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/cve-2021-4115", "url": "https://access.redhat.com/security/cve/cve-2021-4115",
"source": "secalert@redhat.com", "source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45837", "id": "CVE-2021-45837",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-04-25T11:15:07.103", "published": "2022-04-25T11:15:07.103",
"lastModified": "2022-05-05T16:44:03.937", "lastModified": "2023-06-12T07:16:06.817",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -110,6 +110,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html",
"source": "cve@mitre.org"
},
{ {
"url": "https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/", "url": "https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45839", "id": "CVE-2021-45839",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-04-25T11:15:07.147", "published": "2022-04-25T11:15:07.147",
"lastModified": "2022-05-05T17:18:09.507", "lastModified": "2023-06-12T07:16:10.573",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -110,6 +110,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html",
"source": "cve@mitre.org"
},
{ {
"url": "https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/", "url": "https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45841", "id": "CVE-2021-45841",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-04-25T11:15:07.237", "published": "2022-04-25T11:15:07.237",
"lastModified": "2022-05-05T17:08:56.933", "lastModified": "2023-06-12T07:16:12.170",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -110,6 +110,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html",
"source": "cve@mitre.org"
},
{ {
"url": "https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/", "url": "https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1134", "id": "CVE-2022-1134",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2022-07-23T00:15:08.787", "published": "2022-07-23T00:15:08.787",
"lastModified": "2022-10-25T18:52:43.163", "lastModified": "2023-06-12T07:16:15.503",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -69,6 +69,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172851/Chrome-Renderer-Type-Confusion-Remote-Code-Execution.html",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_29.html", "url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_29.html",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-20186", "id": "CVE-2022-20186",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2022-06-15T14:15:12.730", "published": "2022-06-15T14:15:12.730",
"lastModified": "2022-06-24T02:50:04.677", "lastModified": "2023-06-12T07:16:18.807",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -93,6 +93,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172852/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html",
"source": "security@android.com"
},
{ {
"url": "https://source.android.com/security/bulletin/pixel/2022-06-01", "url": "https://source.android.com/security/bulletin/pixel/2022-06-01",
"source": "security@android.com", "source": "security@android.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-22057", "id": "CVE-2022-22057",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-06-14T10:15:18.763", "published": "2022-06-14T10:15:18.763",
"lastModified": "2023-04-19T17:10:55.030", "lastModified": "2023-06-12T07:16:22.287",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -2258,6 +2258,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172850/Qualcomm-kgsl-Driver-Use-After-Free.html",
"source": "product-security@qualcomm.com"
},
{ {
"url": "https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin", "url": "https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin",
"source": "product-security@qualcomm.com", "source": "product-security@qualcomm.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-25664", "id": "CVE-2022-25664",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-10-19T11:15:10.387", "published": "2022-10-19T11:15:10.387",
"lastModified": "2023-04-19T17:10:55.030", "lastModified": "2023-06-12T07:16:31.763",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -3043,6 +3043,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172853/Qualcomm-Adreno-GPU-Information-Leak.html",
"source": "product-security@qualcomm.com"
},
{ {
"url": "https://www.qualcomm.com/company/product-security/bulletins/october-2022-bulletin", "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2022-bulletin",
"source": "product-security@qualcomm.com", "source": "product-security@qualcomm.com",

View File

@ -2,8 +2,12 @@
"id": "CVE-2022-38181", "id": "CVE-2022-38181",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-10-25T19:15:11.487", "published": "2022-10-25T19:15:11.487",
"lastModified": "2023-03-01T18:11:45.733", "lastModified": "2023-06-12T07:16:46.037",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cisaExploitAdd": "2023-03-30",
"cisaActionDue": "2023-04-20",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -94,6 +98,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html",
"source": "cve@mitre.org"
},
{ {
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities", "url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46395", "id": "CVE-2022-46395",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-03-06T14:15:09.367", "published": "2023-03-06T14:15:09.367",
"lastModified": "2023-03-13T17:48:08.393", "lastModified": "2023-06-12T07:16:49.167",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -85,6 +85,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172855/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html",
"source": "cve@mitre.org"
},
{ {
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities", "url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,12 @@
"id": "CVE-2023-21839", "id": "CVE-2023-21839",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2023-01-18T00:15:13.450", "published": "2023-01-18T00:15:13.450",
"lastModified": "2023-01-24T19:28:40.867", "lastModified": "2023-06-12T07:16:53.787",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cisaExploitAdd": "2023-05-01",
"cisaActionDue": "2023-05-22",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Oracle WebLogic Server Unspecified Vulnerability",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -74,6 +78,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html",
"source": "secalert_us@oracle.com"
},
{ {
"url": "https://www.oracle.com/security-alerts/cpujan2023.html", "url": "https://www.oracle.com/security-alerts/cpujan2023.html",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21931", "id": "CVE-2023-21931",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2023-04-18T20:15:13.963", "published": "2023-04-18T20:15:13.963",
"lastModified": "2023-04-20T15:02:26.770", "lastModified": "2023-06-12T07:17:03.413",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -74,6 +74,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html",
"source": "secalert_us@oracle.com"
},
{ {
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2283", "id": "CVE-2023-2283",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-26T18:15:13.770", "published": "2023-05-26T18:15:13.770",
"lastModified": "2023-06-06T14:54:27.843", "lastModified": "2023-06-12T07:17:05.597",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -118,6 +118,10 @@
} }
], ],
"references": [ "references": [
{
"url": "http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2023-2283", "url": "https://access.redhat.com/security/cve/CVE-2023-2283",
"source": "secalert@redhat.com", "source": "secalert@redhat.com",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-06-12T06:00:25.083848+00:00 2023-06-12T08:00:23.939569+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-06-12T05:15:09.400000+00:00 2023-06-12T07:17:05.597000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -29,20 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
217410 217411
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `1` Recently added CVEs: `1`
* [CVE-2023-26133](CVE-2023/CVE-2023-261xx/CVE-2023-26133.json) (`2023-06-12T05:15:09.400`) * [CVE-2015-10118](CVE-2015/CVE-2015-101xx/CVE-2015-10118.json) (`2023-06-12T07:15:09.000`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `51`
* [CVE-2020-28188](CVE-2020/CVE-2020-281xx/CVE-2020-28188.json) (`2023-06-12T07:15:14.877`)
* [CVE-2020-35665](CVE-2020/CVE-2020-356xx/CVE-2020-35665.json) (`2023-06-12T07:15:15.967`)
* [CVE-2020-6449](CVE-2020/CVE-2020-64xx/CVE-2020-6449.json) (`2023-06-12T07:15:16.697`)
* [CVE-2021-1940](CVE-2021/CVE-2021-19xx/CVE-2021-1940.json) (`2023-06-12T07:15:17.517`)
* [CVE-2021-1968](CVE-2021/CVE-2021-19xx/CVE-2021-1968.json) (`2023-06-12T07:15:24.900`)
* [CVE-2021-1969](CVE-2021/CVE-2021-19xx/CVE-2021-1969.json) (`2023-06-12T07:15:33.443`)
* [CVE-2021-24499](CVE-2021/CVE-2021-244xx/CVE-2021-24499.json) (`2023-06-12T07:15:43.480`)
* [CVE-2021-30528](CVE-2021/CVE-2021-305xx/CVE-2021-30528.json) (`2023-06-12T07:15:46.957`)
* [CVE-2021-30632](CVE-2021/CVE-2021-306xx/CVE-2021-30632.json) (`2023-06-12T07:15:51.953`)
* [CVE-2021-37975](CVE-2021/CVE-2021-379xx/CVE-2021-37975.json) (`2023-06-12T07:15:55.357`)
* [CVE-2021-3560](CVE-2021/CVE-2021-35xx/CVE-2021-3560.json) (`2023-06-12T07:15:58.090`)
* [CVE-2021-3939](CVE-2021/CVE-2021-39xx/CVE-2021-3939.json) (`2023-06-12T07:16:02.547`)
* [CVE-2021-45837](CVE-2021/CVE-2021-458xx/CVE-2021-45837.json) (`2023-06-12T07:16:06.817`)
* [CVE-2021-45839](CVE-2021/CVE-2021-458xx/CVE-2021-45839.json) (`2023-06-12T07:16:10.573`)
* [CVE-2021-45841](CVE-2021/CVE-2021-458xx/CVE-2021-45841.json) (`2023-06-12T07:16:12.170`)
* [CVE-2021-4115](CVE-2021/CVE-2021-41xx/CVE-2021-4115.json) (`2023-06-12T07:16:13.773`)
* [CVE-2022-1134](CVE-2022/CVE-2022-11xx/CVE-2022-1134.json) (`2023-06-12T07:16:15.503`)
* [CVE-2022-20186](CVE-2022/CVE-2022-201xx/CVE-2022-20186.json) (`2023-06-12T07:16:18.807`)
* [CVE-2022-22057](CVE-2022/CVE-2022-220xx/CVE-2022-22057.json) (`2023-06-12T07:16:22.287`)
* [CVE-2022-25664](CVE-2022/CVE-2022-256xx/CVE-2022-25664.json) (`2023-06-12T07:16:31.763`)
* [CVE-2022-38181](CVE-2022/CVE-2022-381xx/CVE-2022-38181.json) (`2023-06-12T07:16:46.037`)
* [CVE-2022-46395](CVE-2022/CVE-2022-463xx/CVE-2022-46395.json) (`2023-06-12T07:16:49.167`)
* [CVE-2023-21839](CVE-2023/CVE-2023-218xx/CVE-2023-21839.json) (`2023-06-12T07:16:53.787`)
* [CVE-2023-21931](CVE-2023/CVE-2023-219xx/CVE-2023-21931.json) (`2023-06-12T07:17:03.413`)
* [CVE-2023-2283](CVE-2023/CVE-2023-22xx/CVE-2023-2283.json) (`2023-06-12T07:17:05.597`)
## Download and Usage ## Download and Usage