Auto-Update: 2023-06-17T02:00:30.497320+00:00

This commit is contained in:
cad-safe-bot 2023-06-17 02:00:34 +00:00
parent f21789ac20
commit e5895dc3fe
31 changed files with 1630 additions and 170 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-11840",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-09T16:29:00.607",
"lastModified": "2022-10-07T14:39:21.177",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-17T00:15:09.427",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -185,6 +185,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-11841",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-22T17:29:00.287",
"lastModified": "2022-05-03T14:22:52.797",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-17T00:15:09.527",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -146,6 +146,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html",
"source": "cve@mitre.org"
},
{
"url": "https://sec-consult.com/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-9283",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-02-20T20:15:10.437",
"lastModified": "2022-01-01T19:40:00.633",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-17T00:15:09.637",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -148,6 +148,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33877",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-06-13T09:15:14.420",
"lastModified": "2023-06-13T13:00:47.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:38:14.087",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,73 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "6.4.0",
"versionEndIncluding": "6.4.8",
"matchCriteriaId": "C819FC90-3D14-44CD-B535-CC27E1FC72BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.6",
"matchCriteriaId": "F85CB8D4-3ED9-4D9B-875E-5A49DDB57955"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticonverter:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "6.0.0",
"versionEndIncluding": "6.0.3",
"matchCriteriaId": "6FD18122-8007-49EF-B42A-D71A2EE050C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticonverter:6.2.0:*:*:*:*:windows:*:*",
"matchCriteriaId": "A3B57132-7A55-4F4A-94CD-5D221B714767"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticonverter:6.2.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "7B465F34-AF8B-495C-9A18-95F0E1EC51DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticonverter:7.0.0:*:*:*:*:windows:*:*",
"matchCriteriaId": "64FF6C37-0CF1-4917-B289-CD4E3E81564F"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-229",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41327",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-06-13T09:15:14.960",
"lastModified": "2023-06-13T13:00:47.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:37:49.700",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,68 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.7",
"matchCriteriaId": "3F3A99BB-534C-4984-948B-8FFF659A9B9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F302F8-482A-4DA9-BDD9-63886B202B52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "91E7F209-D645-48EC-BB5F-E730E55E8EE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.8",
"matchCriteriaId": "0983FC2C-A9F2-4918-81E6-BDCF05E5BF65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndIncluding": "7.2.4",
"matchCriteriaId": "4AB643A8-B52F-4D54-B816-28A6401BAA25"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-380",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42474",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-06-13T09:15:15.597",
"lastModified": "2023-06-13T13:00:47.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:37:14.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,130 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndIncluding": "1.0.7",
"matchCriteriaId": "22936F53-4480-4011-9211-174D1C507E87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.0",
"versionEndIncluding": "1.1.6",
"matchCriteriaId": "E6BBF05F-4967-4A2E-A8F8-C2086097148B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.0",
"versionEndIncluding": "1.2.13",
"matchCriteriaId": "33B84D9A-55E3-4146-A55A-ACB507E61B05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndIncluding": "2.0.11",
"matchCriteriaId": "6607C71D-D434-430A-8DFD-9125381D2D36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.7",
"matchCriteriaId": "3F3A99BB-534C-4984-948B-8FFF659A9B9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F302F8-482A-4DA9-BDD9-63886B202B52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "91E7F209-D645-48EC-BB5F-E730E55E8EE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4A6B0D-1614-443B-8EBA-A8FBC2E1A832"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "331A1766-4EBA-4519-A8ED-E0DD68A187E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2B73D78B-2270-45B7-854E-F985B8D88F3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "469E9E1C-154C-41CB-AC83-FBE5E6FA83EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndIncluding": "6.2.15",
"matchCriteriaId": "7916D6BB-838E-40A0-9C7F-FBE9ECBA0D99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndIncluding": "6.4.12",
"matchCriteriaId": "5E99B6E5-7EC3-406C-AFAC-A5E32DE266DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.9",
"matchCriteriaId": "9E775D02-7C02-40BE-A118-D874B9BBC936"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndIncluding": "7.2.3",
"matchCriteriaId": "813E179E-B948-4480-A5B1-B0ED562A41BC"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-393",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42478",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-06-13T09:15:15.653",
"lastModified": "2023-06-13T13:00:47.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:35:00.727",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,168 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1.0",
"versionEndIncluding": "5.1.3",
"matchCriteriaId": "D52F2E6B-9A88-4DB4-8CB9-09A3AFFF1685"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3.0",
"versionEndIncluding": "5.3.3",
"matchCriteriaId": "A0258A88-352D-4F9A-894D-F7442CAFE461"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.0",
"versionEndIncluding": "6.3.3",
"matchCriteriaId": "D9FC4C46-F269-4635-80BE-BED292538FEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AE69B846-3B23-401D-98D0-46DC976A25FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:5.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4C2A49-23CB-4104-A345-46B3B4A29A24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:5.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4B114C6F-82AF-4ADF-B840-61851B9E39C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:5.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0C759185-C780-426F-8185-258C88A924A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:5.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B669A735-2DC0-434A-9CE1-0232F62848D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:5.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4A5FA2FC-419D-46E8-ACE3-929E5B39F1AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91E43A1B-D4C5-4FFF-9D3E-00140023921E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F52E2B2-A3B1-493F-B092-77A2A44E855A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B16CB79-AC63-41EA-AE9A-D6030449ACD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "912BA146-D840-4855-8C47-AC3D5E6D0C4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51452B16-AB83-41D3-8779-3E1AEA818AD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3F453DE5-E31D-4BD1-8978-DD6D166045E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C48AC74D-9FBE-4194-9BE8-FD2D6A0EC788"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BFFA27A5-0168-4261-9A04-D2DBB0A9946D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2035DFA0-FF3A-4BBF-ABFE-0E310A7C668B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A391C353-BD26-4262-B86F-E3FBF8915DCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD5BE55-0990-4646-ADA7-9A30981D4DF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F46426B1-B144-432C-8BA6-317617EBC110"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6590962C-FF61-4237-8F30-33B15829C8B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "32B5BFCB-DFD4-4519-A2AF-1FABA58FA04D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50635727-53A0-476F-BB86-A47CDAA3D45B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0534E1D8-8099-4FF1-A5A9-36CCA8F7956A"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-258",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43949",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-06-13T09:15:16.027",
"lastModified": "2023-06-13T13:00:47.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:41:21.763",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,123 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3.0",
"versionEndIncluding": "5.3.3",
"matchCriteriaId": "A0258A88-352D-4F9A-894D-F7442CAFE461"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.0",
"versionEndIncluding": "6.3.3",
"matchCriteriaId": "D9FC4C46-F269-4635-80BE-BED292538FEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.0",
"versionEndIncluding": "6.6.3",
"matchCriteriaId": "EB301503-0ECB-4D21-B341-ACF0F302CF85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91E43A1B-D4C5-4FFF-9D3E-00140023921E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F52E2B2-A3B1-493F-B092-77A2A44E855A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B16CB79-AC63-41EA-AE9A-D6030449ACD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "912BA146-D840-4855-8C47-AC3D5E6D0C4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51452B16-AB83-41D3-8779-3E1AEA818AD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3F453DE5-E31D-4BD1-8978-DD6D166045E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C48AC74D-9FBE-4194-9BE8-FD2D6A0EC788"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BFFA27A5-0168-4261-9A04-D2DBB0A9946D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2035DFA0-FF3A-4BBF-ABFE-0E310A7C668B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A391C353-BD26-4262-B86F-E3FBF8915DCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD5BE55-0990-4646-ADA7-9A30981D4DF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0534E1D8-8099-4FF1-A5A9-36CCA8F7956A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E6B1E1-6527-4A64-BB77-0505E58C2F36"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-259",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43953",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-06-13T09:15:16.077",
"lastModified": "2023-06-13T13:00:47.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:40:49.737",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,82 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-134"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.7",
"matchCriteriaId": "3F3A99BB-534C-4984-948B-8FFF659A9B9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F302F8-482A-4DA9-BDD9-63886B202B52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "91E7F209-D645-48EC-BB5F-E730E55E8EE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndIncluding": "6.2.15",
"matchCriteriaId": "7916D6BB-838E-40A0-9C7F-FBE9ECBA0D99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndIncluding": "6.4.12",
"matchCriteriaId": "5E99B6E5-7EC3-406C-AFAC-A5E32DE266DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.11",
"matchCriteriaId": "C2573C90-BE6A-4D5D-A223-F09213318909"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndIncluding": "7.2.4",
"matchCriteriaId": "4AB643A8-B52F-4D54-B816-28A6401BAA25"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-463",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,15 +2,38 @@
"id": "CVE-2023-0431",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-12T18:15:09.847",
"lastModified": "2023-06-12T18:22:56.843",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:38:33.253",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The File Away WordPress plugin through 3.9.9.0.1 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
@ -23,10 +46,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:file_away_project:file_away:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.9.9.0.1",
"matchCriteriaId": "703EF8B5-6173-4E98-8C71-51A3E08325E9"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/fdcbd9a3-552d-439e-b283-1d3d934889af",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22633",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-06-13T09:15:16.127",
"lastModified": "2023-06-13T13:00:47.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:40:42.317",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,80 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.7.0",
"versionEndIncluding": "8.7.6",
"matchCriteriaId": "3BD32B25-76B4-4D6E-BB5C-065070297058"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.8.0",
"versionEndIncluding": "8.8.11",
"matchCriteriaId": "46929BE3-0396-4B8A-9889-9F6CA73FAD4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.1.0",
"versionEndIncluding": "9.1.8",
"matchCriteriaId": "4DFD62C8-07EF-4C7C-B18B-414A9C4A2955"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.2.0",
"versionEndIncluding": "9.2.6",
"matchCriteriaId": "9331C47E-0CA4-4B2F-A89F-5C0AAEF3ECAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortinac:9.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E12E11B0-E21A-4124-9DF9-FF268BB19813"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortinac:9.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4648F862-AB8C-4B8D-8F2D-5D2641F08845"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "77DE647F-0252-42E2-8BDD-C98DC899C613"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-521",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22639",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-06-13T09:15:16.177",
"lastModified": "2023-06-13T13:00:47.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:40:25.107",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,122 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndIncluding": "1.0.7",
"matchCriteriaId": "22936F53-4480-4011-9211-174D1C507E87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.0",
"versionEndIncluding": "1.1.6",
"matchCriteriaId": "E6BBF05F-4967-4A2E-A8F8-C2086097148B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.0",
"versionEndIncluding": "1.2.13",
"matchCriteriaId": "33B84D9A-55E3-4146-A55A-ACB507E61B05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndIncluding": "2.0.12",
"matchCriteriaId": "7C1D5E6B-A23E-4A92-B53C-720AFEB1B951"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.8",
"matchCriteriaId": "C83139FA-7195-4171-8BC6-CC4F9379C7C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F302F8-482A-4DA9-BDD9-63886B202B52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "91E7F209-D645-48EC-BB5F-E730E55E8EE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7028AFDA-6CB5-4DB0-8977-9BA995DE14C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndIncluding": "6.0.17",
"matchCriteriaId": "0135464C-532C-430D-A76C-2FCDE4C991D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndIncluding": "6.2.15",
"matchCriteriaId": "7916D6BB-838E-40A0-9C7F-FBE9ECBA0D99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndIncluding": "6.4.12",
"matchCriteriaId": "5E99B6E5-7EC3-406C-AFAC-A5E32DE266DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.9",
"matchCriteriaId": "9E775D02-7C02-40BE-A118-D874B9BBC936"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndIncluding": "7.2.3",
"matchCriteriaId": "813E179E-B948-4480-A5B1-B0ED562A41BC"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-494",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23408",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-03-14T17:15:14.220",
"lastModified": "2023-03-20T16:14:45.200",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-17T01:15:40.703",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -33,18 +33,18 @@
"impactScore": 3.6
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.5,
"baseSeverity": "MEDIUM"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23416",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-03-14T17:15:14.967",
"lastModified": "2023-03-23T16:55:33.223",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-17T01:15:40.787",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -33,23 +33,23 @@
"impactScore": 5.9
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24856",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-03-14T17:15:15.837",
"lastModified": "2023-03-20T03:55:15.857",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-17T01:15:40.860",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -33,23 +33,23 @@
"impactScore": 3.6
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24921",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-03-14T17:15:19.133",
"lastModified": "2023-03-17T00:34:10.840",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-17T01:15:40.987",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -33,24 +33,24 @@
"impactScore": 2.7
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
"impactScore": 2.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25609",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-06-13T09:15:16.227",
"lastModified": "2023-06-13T13:00:47.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:40:04.447",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,85 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.8",
"versionEndIncluding": "6.4.11",
"matchCriteriaId": "A1422EEA-A01E-4451-ACB4-1EC85FC15E02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.6",
"matchCriteriaId": "77DD4559-290F-424D-8696-20AE8FF42714"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "319D2F9D-E1E5-49C7-8ABD-0A64D7B05D58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FDD88F7C-8136-4CFF-AF1E-9AE928878C7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.8",
"versionEndIncluding": "6.4.11",
"matchCriteriaId": "431C5172-EFBC-4E26-AAF5-97A1251A368B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.6",
"matchCriteriaId": "D25913D0-D586-4A59-9723-E26009AD17E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "407755AA-0C23-4C5B-88A2-8BC12A3D268D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A0A1111-4054-4C7B-B333-E13A8684207B"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-493",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,15 +2,38 @@
"id": "CVE-2023-2568",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-12T18:15:10.093",
"lastModified": "2023-06-12T18:22:56.843",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:38:25.687",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Photo Gallery by Ays WordPress plugin before 5.1.7 does not escape some parameters before outputting it back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
@ -23,10 +46,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ays-pro:photo_gallery:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.1.7",
"matchCriteriaId": "B711EF8A-5219-4470-A153-79197568B332"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/b1704a12-459b-4f5d-aa2d-a96646ddaf3e",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26204",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-06-13T09:15:16.417",
"lastModified": "2023-06-13T13:00:42.717",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:39:19.410",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,120 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3.0",
"versionEndIncluding": "5.3.3",
"matchCriteriaId": "A0258A88-352D-4F9A-894D-F7442CAFE461"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.0",
"versionEndIncluding": "6.3.3",
"matchCriteriaId": "D9FC4C46-F269-4635-80BE-BED292538FEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.0",
"versionEndIncluding": "6.6.3",
"matchCriteriaId": "EB301503-0ECB-4D21-B341-ACF0F302CF85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndIncluding": "6.7.5",
"matchCriteriaId": "20FD2D69-73DD-4EA4-ADE6-EB4BCFED7AC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91E43A1B-D4C5-4FFF-9D3E-00140023921E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F52E2B2-A3B1-493F-B092-77A2A44E855A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B16CB79-AC63-41EA-AE9A-D6030449ACD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "912BA146-D840-4855-8C47-AC3D5E6D0C4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51452B16-AB83-41D3-8779-3E1AEA818AD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3F453DE5-E31D-4BD1-8978-DD6D166045E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C48AC74D-9FBE-4194-9BE8-FD2D6A0EC788"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BFFA27A5-0168-4261-9A04-D2DBB0A9946D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2035DFA0-FF3A-4BBF-ABFE-0E310A7C668B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A391C353-BD26-4262-B86F-E3FBF8915DCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD5BE55-0990-4646-ADA7-9A30981D4DF2"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-21-141",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28248",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-11T21:15:24.803",
"lastModified": "2023-05-11T18:15:12.443",
"lastModified": "2023-06-17T01:15:41.097",
"vulnStatus": "Modified",
"descriptions": [
{
@ -116,10 +116,6 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/172283/Windows-Kernel-CmpCleanupLightWeightPrepare-Use-After-Free.html",
"source": "secure@microsoft.com"
},
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28248",
"source": "secure@microsoft.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28261",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-27T19:15:20.350",
"lastModified": "2023-05-08T13:58:25.660",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-17T01:15:41.167",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.4,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -31,26 +51,6 @@
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28263",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-11T21:15:25.627",
"lastModified": "2023-04-19T15:41:21.227",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-17T01:15:41.280",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -33,19 +33,19 @@
"impactScore": 3.6
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28271",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-11T21:15:26.120",
"lastModified": "2023-05-11T18:15:12.650",
"lastModified": "2023-06-17T01:15:41.343",
"vulnStatus": "Modified",
"descriptions": [
{
@ -142,10 +142,6 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/172298/Windows-Kernel-Uninitialized-Memory-Pointer-Disclosure.html",
"source": "secure@microsoft.com"
},
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28271",
"source": "secure@microsoft.com",

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-28287",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-06-17T01:15:41.423",
"lastModified": "2023-06-17T01:15:41.423",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Publisher Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28287",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28288",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-11T21:15:27.017",
"lastModified": "2023-04-19T14:50:09.943",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-17T01:15:41.597",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
@ -31,26 +51,6 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28293",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-11T21:15:27.317",
"lastModified": "2023-05-11T18:15:12.817",
"lastModified": "2023-06-17T01:15:41.663",
"vulnStatus": "Modified",
"descriptions": [
{
@ -136,10 +136,6 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/172300/Windows-Kernel-CmpDoReDoCreateKey-CmpDoReOpenTransKey-Out-Of-Bounds-Read.html",
"source": "secure@microsoft.com"
},
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28293",
"source": "secure@microsoft.com",

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-28295",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-06-17T01:15:41.727",
"lastModified": "2023-06-17T01:15:41.727",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Publisher Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28295",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28301",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-11T21:15:27.840",
"lastModified": "2023-04-19T20:23:07.317",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-17T01:15:41.840",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -33,24 +33,24 @@
"impactScore": 1.4
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30198",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-12T17:15:09.760",
"lastModified": "2023-06-12T18:22:56.843",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:41:38.440",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -34,14 +54,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webbax:winbizpayment:*:*:*:*:*:prestashop:*:*",
"versionEndIncluding": "1.0.2",
"matchCriteriaId": "2956FF3D-D59C-404D-8BB6-28B4AC8A10A9"
}
]
}
]
}
],
"references": [
{
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/06/08/winbizpayment.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/PrestaShop/PrestaShop/blob/6c05518b807d014ee8edb811041e3de232520c28/classes/Tools.php#L1247",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,15 +2,41 @@
"id": "CVE-2023-3229",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-06-14T06:15:08.877",
"lastModified": "2023-06-14T12:54:19.587",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-17T01:42:13.593",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Business Logic Errors in GitHub repository fossbilling/fossbilling prior to 0.5.0."
},
{
"lang": "es",
"value": "Errores de l\u00f3gica empresarial en el repositorio de GitHub fossbilling/fossbilling anterior a 0.5.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -46,14 +72,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fossbilling:fossbilling:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.5.0",
"matchCriteriaId": "EFD5D230-F0DE-4BCE-99B7-4074CD4799AA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/fossbilling/fossbilling/commit/56a64fefddf6a0b06304bdd443fdb0bb55423533",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.dev/bounties/31f48ca1-e5e8-436f-b779-cad597759170",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-06-16T23:55:25.535300+00:00
2023-06-17T02:00:30.497320+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-06-16T23:15:08.817000+00:00
2023-06-17T01:42:13.593000+00:00
```
### Last Data Feed Release
@ -23,26 +23,52 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2023-06-16T00:00:13.573516+00:00
2023-06-17T00:00:13.563690+00:00
```
### Total Number of included CVEs
```plain
217968
217970
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `2`
* [CVE-2023-34459](CVE-2023/CVE-2023-344xx/CVE-2023-34459.json) (`2023-06-16T23:15:08.817`)
* [CVE-2023-28287](CVE-2023/CVE-2023-282xx/CVE-2023-28287.json) (`2023-06-17T01:15:41.423`)
* [CVE-2023-28295](CVE-2023/CVE-2023-282xx/CVE-2023-28295.json) (`2023-06-17T01:15:41.727`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `28`
* [CVE-2022-42478](CVE-2022/CVE-2022-424xx/CVE-2022-42478.json) (`2023-06-17T01:35:00.727`)
* [CVE-2022-42474](CVE-2022/CVE-2022-424xx/CVE-2022-42474.json) (`2023-06-17T01:37:14.570`)
* [CVE-2022-41327](CVE-2022/CVE-2022-413xx/CVE-2022-41327.json) (`2023-06-17T01:37:49.700`)
* [CVE-2022-33877](CVE-2022/CVE-2022-338xx/CVE-2022-33877.json) (`2023-06-17T01:38:14.087`)
* [CVE-2022-43953](CVE-2022/CVE-2022-439xx/CVE-2022-43953.json) (`2023-06-17T01:40:49.737`)
* [CVE-2022-43949](CVE-2022/CVE-2022-439xx/CVE-2022-43949.json) (`2023-06-17T01:41:21.763`)
* [CVE-2023-23408](CVE-2023/CVE-2023-234xx/CVE-2023-23408.json) (`2023-06-17T01:15:40.703`)
* [CVE-2023-23416](CVE-2023/CVE-2023-234xx/CVE-2023-23416.json) (`2023-06-17T01:15:40.787`)
* [CVE-2023-24856](CVE-2023/CVE-2023-248xx/CVE-2023-24856.json) (`2023-06-17T01:15:40.860`)
* [CVE-2023-24921](CVE-2023/CVE-2023-249xx/CVE-2023-24921.json) (`2023-06-17T01:15:40.987`)
* [CVE-2023-28248](CVE-2023/CVE-2023-282xx/CVE-2023-28248.json) (`2023-06-17T01:15:41.097`)
* [CVE-2023-28261](CVE-2023/CVE-2023-282xx/CVE-2023-28261.json) (`2023-06-17T01:15:41.167`)
* [CVE-2023-28263](CVE-2023/CVE-2023-282xx/CVE-2023-28263.json) (`2023-06-17T01:15:41.280`)
* [CVE-2023-28271](CVE-2023/CVE-2023-282xx/CVE-2023-28271.json) (`2023-06-17T01:15:41.343`)
* [CVE-2023-28288](CVE-2023/CVE-2023-282xx/CVE-2023-28288.json) (`2023-06-17T01:15:41.597`)
* [CVE-2023-28293](CVE-2023/CVE-2023-282xx/CVE-2023-28293.json) (`2023-06-17T01:15:41.663`)
* [CVE-2023-28301](CVE-2023/CVE-2023-283xx/CVE-2023-28301.json) (`2023-06-17T01:15:41.840`)
* [CVE-2023-2568](CVE-2023/CVE-2023-25xx/CVE-2023-2568.json) (`2023-06-17T01:38:25.687`)
* [CVE-2023-0431](CVE-2023/CVE-2023-04xx/CVE-2023-0431.json) (`2023-06-17T01:38:33.253`)
* [CVE-2023-26204](CVE-2023/CVE-2023-262xx/CVE-2023-26204.json) (`2023-06-17T01:39:19.410`)
* [CVE-2023-25609](CVE-2023/CVE-2023-256xx/CVE-2023-25609.json) (`2023-06-17T01:40:04.447`)
* [CVE-2023-22639](CVE-2023/CVE-2023-226xx/CVE-2023-22639.json) (`2023-06-17T01:40:25.107`)
* [CVE-2023-22633](CVE-2023/CVE-2023-226xx/CVE-2023-22633.json) (`2023-06-17T01:40:42.317`)
* [CVE-2023-30198](CVE-2023/CVE-2023-301xx/CVE-2023-30198.json) (`2023-06-17T01:41:38.440`)
* [CVE-2023-3229](CVE-2023/CVE-2023-32xx/CVE-2023-3229.json) (`2023-06-17T01:42:13.593`)
## Download and Usage