Auto-Update: 2023-05-18 18:00:33.198997+00:00

This commit is contained in:
cad-safe-bot 2023-05-18 18:00:36 +00:00
parent 58eb1fdd2f
commit e2a7653351
26 changed files with 1591 additions and 201 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-0598",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2018-06-26T14:29:01.507",
"lastModified": "2023-05-18T14:37:47.437",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-18T16:15:09.463",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -106,6 +106,10 @@
"tags": [
"Broken Link"
]
},
{
"url": "https://msrc.microsoft.com/blog/2018/04/triaging-a-dll-planting-vulnerability/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14597",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:25.410",
"lastModified": "2022-07-01T14:40:11.963",
"lastModified": "2023-05-18T17:39:04.083",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,22 +96,6 @@
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{
"nodes": [
{
@ -196,6 +180,23 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14614",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:26.817",
"lastModified": "2022-07-01T14:40:18.547",
"lastModified": "2023-05-18T18:00:02.037",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,22 +96,6 @@
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{
"nodes": [
{
@ -196,6 +180,23 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14619",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:27.240",
"lastModified": "2022-07-01T14:40:21.427",
"lastModified": "2023-05-18T18:00:07.580",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,22 +96,6 @@
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{
"nodes": [
{
@ -196,6 +180,23 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14631",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:28.347",
"lastModified": "2022-07-01T14:26:09.710",
"lastModified": "2023-05-18T17:56:21.367",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,22 +96,6 @@
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{
"nodes": [
{
@ -171,6 +155,23 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14643",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:29.380",
"lastModified": "2022-07-01T14:02:23.800",
"lastModified": "2023-05-18T17:56:31.617",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,22 +96,6 @@
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{
"nodes": [
{
@ -171,6 +155,23 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14651",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:30.067",
"lastModified": "2022-07-01T14:03:57.943",
"lastModified": "2023-05-18T17:56:35.563",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,22 +96,6 @@
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{
"nodes": [
{
@ -171,6 +155,23 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14654",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:30.473",
"lastModified": "2022-07-01T14:05:30.017",
"lastModified": "2023-05-18T17:56:39.937",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,22 +96,6 @@
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{
"nodes": [
{
@ -171,6 +155,23 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14656",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:30.647",
"lastModified": "2022-06-30T20:55:34.813",
"lastModified": "2023-05-18T17:56:09.937",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,22 +96,6 @@
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{
"nodes": [
{
@ -171,6 +155,23 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14663",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:31.240",
"lastModified": "2022-06-30T20:59:13.787",
"lastModified": "2023-05-18T17:56:04.947",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,22 +96,6 @@
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{
"nodes": [
{
@ -171,6 +155,23 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
}
],
"references": [

View File

@ -2,19 +2,703 @@
"id": "CVE-2021-26397",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:10.903",
"lastModified": "2023-05-09T20:27:45.710",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T16:44:52.943",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Insufficient address validation, may allow an\nattacker with a compromised ABL and UApp to corrupt sensitive memory locations\npotentially resulting in a loss of integrity or availability.\n\n\n\n\n\n\n\n"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "263AB8A4-3F7B-438F-808D-742FCCA4C51C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "71C28200-421A-4CAB-9D6A-D05C9F56A4FD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "425EC5D5-CF0C-416F-91DA-0BC6EF24237A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "F821EFAC-1FDA-433E-880B-3B5E165708BE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "C9DC9C16-E1C3-4A45-ADF6-17F0A763CB41"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "5804A608-E90A-4EA3-9FE3-48B839B250F0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "1FC3377B-6BE5-4044-9FBB-73CD0BF511F3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "6A788DBB-D426-4200-BFF6-85DB621D0081"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "0BC50066-6F94-4D7C-A13F-D2AC82D0F78D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "1B07E5CE-AF11-4604-AA3D-389A93BA4A04"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
"matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "AE405A6E-591B-4071-A85A-CA0E58A20C5B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "9208F862-3ECD-43F6-932F-3B12BAB90A3B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "DF7B3F45-D6F0-4C1A-B119-8BA44721DD29"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "5810391D-A9D5-4143-88C3-768FC209DEB5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "2CD06657-B191-42D9-A617-253116A94214"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "0DD1876D-FA52-416F-AE70-46501E485BDE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "6D11F267-D5DF-46A8-8835-8D204A8090E2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "7940013E-9F28-463B-AE85-CD1D9C191322"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "3F17D48A-00D1-45C1-9235-9889561E5A5E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "420022FB-EF46-4D78-B9A3-C21F16895F1B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "6E3F2ADB-9CBA-4F23-BB30-26D7DD096EC5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "E0EB4211-6B22-4B04-93EC-BAE8E0515548"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "milanpi_1.0.0.9",
"matchCriteriaId": "3490F5BE-9886-4596-B79C-C79B70822C6D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-25976",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:11.097",
"lastModified": "2023-05-10T14:38:25.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T16:59:10.447",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.7.6.1003",
"matchCriteriaId": "DE2ADAC7-8848-42EA-B13D-161761DDB092"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00692.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-29508",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:11.350",
"lastModified": "2023-05-10T14:38:37.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T16:55:06.113",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.7.6.1003",
"matchCriteriaId": "DE2ADAC7-8848-42EA-B13D-161761DDB092"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00692.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-29919",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:11.480",
"lastModified": "2023-05-10T14:38:42.927",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T16:53:20.133",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.7.6.1003",
"matchCriteriaId": "DE2ADAC7-8848-42EA-B13D-161761DDB092"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00692.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30338",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:11.573",
"lastModified": "2023-05-10T14:38:31.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T16:53:04.497",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.7.6.1003",
"matchCriteriaId": "DE2ADAC7-8848-42EA-B13D-161761DDB092"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00692.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-40210",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:14.267",
"lastModified": "2023-05-10T14:38:19.080",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T17:12:01.823",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.1",
"matchCriteriaId": "9D567F06-931E-49E7-8E5A-BA2F0B800D93"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00772.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-40685",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:14.623",
"lastModified": "2023-05-10T14:38:31.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T17:10:33.620",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.1",
"matchCriteriaId": "9D567F06-931E-49E7-8E5A-BA2F0B800D93"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00772.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41771",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:20.247",
"lastModified": "2023-05-10T14:38:31.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T17:35:45.397",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:quickassist_technology:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.9.0",
"matchCriteriaId": "1BFC159F-20CE-4B19-A2A4-64FC26C704A1"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00778.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41808",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:21.477",
"lastModified": "2023-05-10T14:38:25.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T17:24:11.033",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:quickassist_technology:*:*:*:*:*:linux:*:*",
"versionEndExcluding": "1.7.l.4.12",
"matchCriteriaId": "C11F9B61-7264-4418-BA48-65C978ED9160"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2023-2799",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-18T16:15:09.970",
"lastModified": "2023-05-18T16:15:09.970",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in cnoa OA up to 5.1.1.5. Affected by this issue is some unknown functionality of the file /index.php?app=main&func=passport&action=login. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229376. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.5,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "https://github.com/Peanut886/Vulnerability/blob/main/imgs/2023-Guangzhou%20Xiezhong%20Software%20Technology%20Co.%2C%20LTD/2023-04-10(2).jpg",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The-default-password-vulnerability-exists-in-the-intelligent-cooperative-office-system.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.229376",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.229376",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28528",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-04-28T03:15:08.453",
"lastModified": "2023-05-05T15:19:10.797",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-18T16:15:09.617",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -99,6 +99,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/172458/IBM-AIX-7.2-inscout-Privilege-Escalation.html",
"source": "psirt@us.ibm.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251207",
"source": "psirt@us.ibm.com",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2800",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-18T17:15:08.817",
"lastModified": "2023-05-18T17:15:08.817",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insecure Temporary File in GitHub repository huggingface/transformers prior to 4.30.0."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-377"
}
]
}
],
"references": [
{
"url": "https://github.com/huggingface/transformers/commit/80ca92470938bbcc348e2d9cf4734c7c25cb1c43",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/a3867b4e-6701-4418-8c20-3c6e7084a44a",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31871",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-18T17:15:08.957",
"lastModified": "2023-05-18T17:15:08.957",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "OpenText Documentum Content Server before 23.2 has a flaw that allows for privilege escalation from a non-privileged Documentum user to root. The software comes prepackaged with a root owned SUID binary dm_secure_writer. The binary has security controls in place preventing creation of a file in a non-owned directory, or as the root user. However, these controls can be carefully bypassed to allow for an arbitrary file write as root."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/picar0jsu/a8e623639da34f36202ce5e436668de7",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32243",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-12T08:15:09.280",
"lastModified": "2023-05-12T14:21:57.583",
"lastModified": "2023-05-18T16:15:10.167",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -47,6 +47,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/172457/WordPress-Elementor-Lite-5.7.1-Arbitrary-Password-Reset.html",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/articles/critical-privilege-escalation-in-essential-addons-for-elementor-plugin-affecting-1-million-sites?_s_id=cve",
"source": "audit@patchstack.com"

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2023-32322",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-18T17:15:09.003",
"lastModified": "2023-05-18T17:15:09.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Ombi is an open source application which allows users to request specific media from popular self-hosted streaming servers. Versions prior to 4.38.2 contain an arbitrary file read vulnerability where an Ombi administrative user may access files available to the Ombi server process on the host operating system. Ombi administrators may not always be local system administrators and so this may violate the security expectations of the system. The arbitrary file read vulnerability was present in `ReadLogFile` and `Download` endpoints in `SystemControllers.cs` as the parameter `logFileName` is not sanitized before being combined with the `Logs` directory. When using `Path.Combine(arg1, arg2, arg3)`, an attacker may be able to escape to folders/files outside of `Path.Combine(arg1, arg2)` by using \"..\" in `arg3`. In addition, by specifying an absolute path for `arg3`, `Path.Combine` will completely ignore the first two arguments and just return just `arg3`. This vulnerability can lead to information disclosure. The Ombi `documentation` suggests running Ombi as a Service with Administrator privileges. An attacker targeting such an application may be able to read the files of any Windows user on the host machine and certain system files. This issue has been addressed in commit `b8a8f029` and in release version 4.38.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GHSL-2023-088.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://docs.ombi.app/guides/installation/#windows",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Ombi-app/Ombi/blob/v4.36.1/src/Ombi/Controllers/V2/SystemController.cs#L46",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Ombi-app/Ombi/blob/v4.36.1/src/Ombi/Controllers/V2/SystemController.cs#L58",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Ombi-app/Ombi/commit/b8a8f029d80454d582bc4a2a05175106809335d0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Ombi-app/Ombi/security/advisories/GHSA-28j3-84m7-gpjp",
"source": "security-advisories@github.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-18T16:00:40.901454+00:00
2023-05-18T18:00:33.198997+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-18T15:42:47.343000+00:00
2023-05-18T18:00:07.580000+00:00
```
### Last Data Feed Release
@ -29,29 +29,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
215614
215618
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `4`
* [CVE-2023-2799](CVE-2023/CVE-2023-27xx/CVE-2023-2799.json) (`2023-05-18T16:15:09.970`)
* [CVE-2023-2800](CVE-2023/CVE-2023-28xx/CVE-2023-2800.json) (`2023-05-18T17:15:08.817`)
* [CVE-2023-31871](CVE-2023/CVE-2023-318xx/CVE-2023-31871.json) (`2023-05-18T17:15:08.957`)
* [CVE-2023-32322](CVE-2023/CVE-2023-323xx/CVE-2023-32322.json) (`2023-05-18T17:15:09.003`)
### CVEs modified in the last Commit
Recently modified CVEs: `10`
Recently modified CVEs: `21`
* [CVE-2018-0598](CVE-2018/CVE-2018-05xx/CVE-2018-0598.json) (`2023-05-18T14:37:47.437`)
* [CVE-2019-14788](CVE-2019/CVE-2019-147xx/CVE-2019-14788.json) (`2023-05-18T15:03:03.467`)
* [CVE-2019-9568](CVE-2019/CVE-2019-95xx/CVE-2019-9568.json) (`2023-05-18T15:42:17.260`)
* [CVE-2019-9567](CVE-2019/CVE-2019-95xx/CVE-2019-9567.json) (`2023-05-18T15:42:36.547`)
* [CVE-2020-35933](CVE-2020/CVE-2020-359xx/CVE-2020-35933.json) (`2023-05-18T15:42:47.343`)
* [CVE-2021-24142](CVE-2021/CVE-2021-241xx/CVE-2021-24142.json) (`2023-05-18T15:41:54.550`)
* [CVE-2022-45770](CVE-2022/CVE-2022-457xx/CVE-2022-45770.json) (`2023-05-18T14:15:09.467`)
* [CVE-2022-21804](CVE-2022/CVE-2022-218xx/CVE-2022-21804.json) (`2023-05-18T15:01:51.387`)
* [CVE-2022-21239](CVE-2022/CVE-2022-212xx/CVE-2022-21239.json) (`2023-05-18T15:02:20.717`)
* [CVE-2022-21162](CVE-2022/CVE-2022-211xx/CVE-2022-21162.json) (`2023-05-18T15:06:14.223`)
* [CVE-2018-0598](CVE-2018/CVE-2018-05xx/CVE-2018-0598.json) (`2023-05-18T16:15:09.463`)
* [CVE-2020-14597](CVE-2020/CVE-2020-145xx/CVE-2020-14597.json) (`2023-05-18T17:39:04.083`)
* [CVE-2020-14663](CVE-2020/CVE-2020-146xx/CVE-2020-14663.json) (`2023-05-18T17:56:04.947`)
* [CVE-2020-14656](CVE-2020/CVE-2020-146xx/CVE-2020-14656.json) (`2023-05-18T17:56:09.937`)
* [CVE-2020-14631](CVE-2020/CVE-2020-146xx/CVE-2020-14631.json) (`2023-05-18T17:56:21.367`)
* [CVE-2020-14643](CVE-2020/CVE-2020-146xx/CVE-2020-14643.json) (`2023-05-18T17:56:31.617`)
* [CVE-2020-14651](CVE-2020/CVE-2020-146xx/CVE-2020-14651.json) (`2023-05-18T17:56:35.563`)
* [CVE-2020-14654](CVE-2020/CVE-2020-146xx/CVE-2020-14654.json) (`2023-05-18T17:56:39.937`)
* [CVE-2020-14614](CVE-2020/CVE-2020-146xx/CVE-2020-14614.json) (`2023-05-18T18:00:02.037`)
* [CVE-2020-14619](CVE-2020/CVE-2020-146xx/CVE-2020-14619.json) (`2023-05-18T18:00:07.580`)
* [CVE-2021-26397](CVE-2021/CVE-2021-263xx/CVE-2021-26397.json) (`2023-05-18T16:44:52.943`)
* [CVE-2022-30338](CVE-2022/CVE-2022-303xx/CVE-2022-30338.json) (`2023-05-18T16:53:04.497`)
* [CVE-2022-29919](CVE-2022/CVE-2022-299xx/CVE-2022-29919.json) (`2023-05-18T16:53:20.133`)
* [CVE-2022-29508](CVE-2022/CVE-2022-295xx/CVE-2022-29508.json) (`2023-05-18T16:55:06.113`)
* [CVE-2022-25976](CVE-2022/CVE-2022-259xx/CVE-2022-25976.json) (`2023-05-18T16:59:10.447`)
* [CVE-2022-40685](CVE-2022/CVE-2022-406xx/CVE-2022-40685.json) (`2023-05-18T17:10:33.620`)
* [CVE-2022-40210](CVE-2022/CVE-2022-402xx/CVE-2022-40210.json) (`2023-05-18T17:12:01.823`)
* [CVE-2022-41808](CVE-2022/CVE-2022-418xx/CVE-2022-41808.json) (`2023-05-18T17:24:11.033`)
* [CVE-2022-41771](CVE-2022/CVE-2022-417xx/CVE-2022-41771.json) (`2023-05-18T17:35:45.397`)
* [CVE-2023-28528](CVE-2023/CVE-2023-285xx/CVE-2023-28528.json) (`2023-05-18T16:15:09.617`)
* [CVE-2023-32243](CVE-2023/CVE-2023-322xx/CVE-2023-32243.json) (`2023-05-18T16:15:10.167`)
## Download and Usage