From e5895dc3fe258fdb4c759e7a4788f4d309dddef5 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 17 Jun 2023 02:00:34 +0000 Subject: [PATCH] Auto-Update: 2023-06-17T02:00:30.497320+00:00 --- CVE-2019/CVE-2019-118xx/CVE-2019-11840.json | 8 +- CVE-2019/CVE-2019-118xx/CVE-2019-11841.json | 8 +- CVE-2020/CVE-2020-92xx/CVE-2020-9283.json | 8 +- CVE-2022/CVE-2022-338xx/CVE-2022-33877.json | 89 +++++++++- CVE-2022/CVE-2022-413xx/CVE-2022-41327.json | 84 ++++++++- CVE-2022/CVE-2022-424xx/CVE-2022-42474.json | 146 +++++++++++++++- CVE-2022/CVE-2022-424xx/CVE-2022-42478.json | 184 +++++++++++++++++++- CVE-2022/CVE-2022-439xx/CVE-2022-43949.json | 139 ++++++++++++++- CVE-2022/CVE-2022-439xx/CVE-2022-43953.json | 98 ++++++++++- CVE-2023/CVE-2023-04xx/CVE-2023-0431.json | 52 +++++- CVE-2023/CVE-2023-226xx/CVE-2023-22633.json | 96 +++++++++- CVE-2023/CVE-2023-226xx/CVE-2023-22639.json | 138 ++++++++++++++- CVE-2023/CVE-2023-234xx/CVE-2023-23408.json | 14 +- CVE-2023/CVE-2023-234xx/CVE-2023-23416.json | 16 +- CVE-2023/CVE-2023-248xx/CVE-2023-24856.json | 18 +- CVE-2023/CVE-2023-249xx/CVE-2023-24921.json | 16 +- CVE-2023/CVE-2023-256xx/CVE-2023-25609.json | 101 ++++++++++- CVE-2023/CVE-2023-25xx/CVE-2023-2568.json | 53 +++++- CVE-2023/CVE-2023-262xx/CVE-2023-26204.json | 136 ++++++++++++++- CVE-2023/CVE-2023-282xx/CVE-2023-28248.json | 6 +- CVE-2023/CVE-2023-282xx/CVE-2023-28261.json | 46 ++--- CVE-2023/CVE-2023-282xx/CVE-2023-28263.json | 14 +- CVE-2023/CVE-2023-282xx/CVE-2023-28271.json | 6 +- CVE-2023/CVE-2023-282xx/CVE-2023-28287.json | 43 +++++ CVE-2023/CVE-2023-282xx/CVE-2023-28288.json | 46 ++--- CVE-2023/CVE-2023-282xx/CVE-2023-28293.json | 6 +- CVE-2023/CVE-2023-282xx/CVE-2023-28295.json | 43 +++++ CVE-2023/CVE-2023-283xx/CVE-2023-28301.json | 22 +-- CVE-2023/CVE-2023-301xx/CVE-2023-30198.json | 64 ++++++- CVE-2023/CVE-2023-32xx/CVE-2023-3229.json | 60 ++++++- README.md | 40 ++++- 31 files changed, 1630 insertions(+), 170 deletions(-) create mode 100644 CVE-2023/CVE-2023-282xx/CVE-2023-28287.json create mode 100644 CVE-2023/CVE-2023-282xx/CVE-2023-28295.json diff --git a/CVE-2019/CVE-2019-118xx/CVE-2019-11840.json b/CVE-2019/CVE-2019-118xx/CVE-2019-11840.json index 6d17aa6131e..beb8c907bea 100644 --- a/CVE-2019/CVE-2019-118xx/CVE-2019-11840.json +++ b/CVE-2019/CVE-2019-118xx/CVE-2019-11840.json @@ -2,8 +2,8 @@ "id": "CVE-2019-11840", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-09T16:29:00.607", - "lastModified": "2022-10-07T14:39:21.177", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-17T00:15:09.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -185,6 +185,10 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-118xx/CVE-2019-11841.json b/CVE-2019/CVE-2019-118xx/CVE-2019-11841.json index a8cdc3b573a..195e194dfa2 100644 --- a/CVE-2019/CVE-2019-118xx/CVE-2019-11841.json +++ b/CVE-2019/CVE-2019-118xx/CVE-2019-11841.json @@ -2,8 +2,8 @@ "id": "CVE-2019-11841", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-22T17:29:00.287", - "lastModified": "2022-05-03T14:22:52.797", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-17T00:15:09.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -146,6 +146,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html", + "source": "cve@mitre.org" + }, { "url": "https://sec-consult.com/", "source": "cve@mitre.org", diff --git a/CVE-2020/CVE-2020-92xx/CVE-2020-9283.json b/CVE-2020/CVE-2020-92xx/CVE-2020-9283.json index 4ee478699f0..3d3b351c901 100644 --- a/CVE-2020/CVE-2020-92xx/CVE-2020-9283.json +++ b/CVE-2020/CVE-2020-92xx/CVE-2020-9283.json @@ -2,8 +2,8 @@ "id": "CVE-2020-9283", "sourceIdentifier": "cve@mitre.org", "published": "2020-02-20T20:15:10.437", - "lastModified": "2022-01-01T19:40:00.633", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-17T00:15:09.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -148,6 +148,10 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-338xx/CVE-2022-33877.json b/CVE-2022/CVE-2022-338xx/CVE-2022-33877.json index 31a36298f63..4f097bcadc2 100644 --- a/CVE-2022/CVE-2022-338xx/CVE-2022-33877.json +++ b/CVE-2022/CVE-2022-338xx/CVE-2022-33877.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33877", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-06-13T09:15:14.420", - "lastModified": "2023-06-13T13:00:47.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:38:14.087", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,73 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.8", + "matchCriteriaId": "C819FC90-3D14-44CD-B535-CC27E1FC72BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.6", + "matchCriteriaId": "F85CB8D4-3ED9-4D9B-875E-5A49DDB57955" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticonverter:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "6.0.0", + "versionEndIncluding": "6.0.3", + "matchCriteriaId": "6FD18122-8007-49EF-B42A-D71A2EE050C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticonverter:6.2.0:*:*:*:*:windows:*:*", + "matchCriteriaId": "A3B57132-7A55-4F4A-94CD-5D221B714767" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticonverter:6.2.1:*:*:*:*:windows:*:*", + "matchCriteriaId": "7B465F34-AF8B-495C-9A18-95F0E1EC51DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticonverter:7.0.0:*:*:*:*:windows:*:*", + "matchCriteriaId": "64FF6C37-0CF1-4917-B289-CD4E3E81564F" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-229", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-413xx/CVE-2022-41327.json b/CVE-2022/CVE-2022-413xx/CVE-2022-41327.json index 78a43d35aea..91a9c7d39f6 100644 --- a/CVE-2022/CVE-2022-413xx/CVE-2022-41327.json +++ b/CVE-2022/CVE-2022-413xx/CVE-2022-41327.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41327", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-06-13T09:15:14.960", - "lastModified": "2023-06-13T13:00:47.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:37:49.700", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,68 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.7", + "matchCriteriaId": "3F3A99BB-534C-4984-948B-8FFF659A9B9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F5F302F8-482A-4DA9-BDD9-63886B202B52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "91E7F209-D645-48EC-BB5F-E730E55E8EE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.8", + "matchCriteriaId": "0983FC2C-A9F2-4918-81E6-BDCF05E5BF65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.4", + "matchCriteriaId": "4AB643A8-B52F-4D54-B816-28A6401BAA25" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-380", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42474.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42474.json index 53d57b1dcfb..8490fb17f5d 100644 --- a/CVE-2022/CVE-2022-424xx/CVE-2022-42474.json +++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42474.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42474", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-06-13T09:15:15.597", - "lastModified": "2023-06-13T13:00:47.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:37:14.570", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,130 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndIncluding": "1.0.7", + "matchCriteriaId": "22936F53-4480-4011-9211-174D1C507E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.1.0", + "versionEndIncluding": "1.1.6", + "matchCriteriaId": "E6BBF05F-4967-4A2E-A8F8-C2086097148B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.0", + "versionEndIncluding": "1.2.13", + "matchCriteriaId": "33B84D9A-55E3-4146-A55A-ACB507E61B05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndIncluding": "2.0.11", + "matchCriteriaId": "6607C71D-D434-430A-8DFD-9125381D2D36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.7", + "matchCriteriaId": "3F3A99BB-534C-4984-948B-8FFF659A9B9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F5F302F8-482A-4DA9-BDD9-63886B202B52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "91E7F209-D645-48EC-BB5F-E730E55E8EE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5B4A6B0D-1614-443B-8EBA-A8FBC2E1A832" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "331A1766-4EBA-4519-A8ED-E0DD68A187E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2B73D78B-2270-45B7-854E-F985B8D88F3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "469E9E1C-154C-41CB-AC83-FBE5E6FA83EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndIncluding": "6.2.15", + "matchCriteriaId": "7916D6BB-838E-40A0-9C7F-FBE9ECBA0D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.12", + "matchCriteriaId": "5E99B6E5-7EC3-406C-AFAC-A5E32DE266DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.9", + "matchCriteriaId": "9E775D02-7C02-40BE-A118-D874B9BBC936" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.3", + "matchCriteriaId": "813E179E-B948-4480-A5B1-B0ED562A41BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-393", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42478.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42478.json index fbe99e3c549..c4c6614d65e 100644 --- a/CVE-2022/CVE-2022-424xx/CVE-2022-42478.json +++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42478.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42478", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-06-13T09:15:15.653", - "lastModified": "2023-06-13T13:00:47.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:35:00.727", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,168 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1.0", + "versionEndIncluding": "5.1.3", + "matchCriteriaId": "D52F2E6B-9A88-4DB4-8CB9-09A3AFFF1685" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3.0", + "versionEndIncluding": "5.3.3", + "matchCriteriaId": "A0258A88-352D-4F9A-894D-F7442CAFE461" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndIncluding": "6.3.3", + "matchCriteriaId": "D9FC4C46-F269-4635-80BE-BED292538FEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:5.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AE69B846-3B23-401D-98D0-46DC976A25FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:5.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "DE4C2A49-23CB-4104-A345-46B3B4A29A24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:5.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "4B114C6F-82AF-4ADF-B840-61851B9E39C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:5.2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "0C759185-C780-426F-8185-258C88A924A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:5.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "B669A735-2DC0-434A-9CE1-0232F62848D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:5.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "4A5FA2FC-419D-46E8-ACE3-929E5B39F1AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91E43A1B-D4C5-4FFF-9D3E-00140023921E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F52E2B2-A3B1-493F-B092-77A2A44E855A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7B16CB79-AC63-41EA-AE9A-D6030449ACD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "912BA146-D840-4855-8C47-AC3D5E6D0C4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "51452B16-AB83-41D3-8779-3E1AEA818AD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3F453DE5-E31D-4BD1-8978-DD6D166045E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C48AC74D-9FBE-4194-9BE8-FD2D6A0EC788" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BFFA27A5-0168-4261-9A04-D2DBB0A9946D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2035DFA0-FF3A-4BBF-ABFE-0E310A7C668B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A391C353-BD26-4262-B86F-E3FBF8915DCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EDD5BE55-0990-4646-ADA7-9A30981D4DF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F46426B1-B144-432C-8BA6-317617EBC110" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6590962C-FF61-4237-8F30-33B15829C8B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "32B5BFCB-DFD4-4519-A2AF-1FABA58FA04D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "50635727-53A0-476F-BB86-A47CDAA3D45B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0534E1D8-8099-4FF1-A5A9-36CCA8F7956A" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-258", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-439xx/CVE-2022-43949.json b/CVE-2022/CVE-2022-439xx/CVE-2022-43949.json index fef32984f9f..a18654afccb 100644 --- a/CVE-2022/CVE-2022-439xx/CVE-2022-43949.json +++ b/CVE-2022/CVE-2022-439xx/CVE-2022-43949.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43949", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-06-13T09:15:16.027", - "lastModified": "2023-06-13T13:00:47.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:41:21.763", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,123 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3.0", + "versionEndIncluding": "5.3.3", + "matchCriteriaId": "A0258A88-352D-4F9A-894D-F7442CAFE461" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndIncluding": "6.3.3", + "matchCriteriaId": "D9FC4C46-F269-4635-80BE-BED292538FEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.0", + "versionEndIncluding": "6.6.3", + "matchCriteriaId": "EB301503-0ECB-4D21-B341-ACF0F302CF85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91E43A1B-D4C5-4FFF-9D3E-00140023921E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F52E2B2-A3B1-493F-B092-77A2A44E855A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7B16CB79-AC63-41EA-AE9A-D6030449ACD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "912BA146-D840-4855-8C47-AC3D5E6D0C4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "51452B16-AB83-41D3-8779-3E1AEA818AD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3F453DE5-E31D-4BD1-8978-DD6D166045E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C48AC74D-9FBE-4194-9BE8-FD2D6A0EC788" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BFFA27A5-0168-4261-9A04-D2DBB0A9946D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2035DFA0-FF3A-4BBF-ABFE-0E310A7C668B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A391C353-BD26-4262-B86F-E3FBF8915DCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EDD5BE55-0990-4646-ADA7-9A30981D4DF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0534E1D8-8099-4FF1-A5A9-36CCA8F7956A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D7E6B1E1-6527-4A64-BB77-0505E58C2F36" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-259", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-439xx/CVE-2022-43953.json b/CVE-2022/CVE-2022-439xx/CVE-2022-43953.json index a573522f8dc..f475abe924d 100644 --- a/CVE-2022/CVE-2022-439xx/CVE-2022-43953.json +++ b/CVE-2022/CVE-2022-439xx/CVE-2022-43953.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43953", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-06-13T09:15:16.077", - "lastModified": "2023-06-13T13:00:47.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:40:49.737", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,82 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-134" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.7", + "matchCriteriaId": "3F3A99BB-534C-4984-948B-8FFF659A9B9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F5F302F8-482A-4DA9-BDD9-63886B202B52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "91E7F209-D645-48EC-BB5F-E730E55E8EE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndIncluding": "6.2.15", + "matchCriteriaId": "7916D6BB-838E-40A0-9C7F-FBE9ECBA0D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.12", + "matchCriteriaId": "5E99B6E5-7EC3-406C-AFAC-A5E32DE266DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.11", + "matchCriteriaId": "C2573C90-BE6A-4D5D-A223-F09213318909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.4", + "matchCriteriaId": "4AB643A8-B52F-4D54-B816-28A6401BAA25" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-463", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0431.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0431.json index a8fa1a27e2e..9d635030771 100644 --- a/CVE-2023/CVE-2023-04xx/CVE-2023-0431.json +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0431.json @@ -2,15 +2,38 @@ "id": "CVE-2023-0431", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-12T18:15:09.847", - "lastModified": "2023-06-12T18:22:56.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:38:33.253", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The File Away WordPress plugin through 3.9.9.0.1 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:file_away_project:file_away:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.9.0.1", + "matchCriteriaId": "703EF8B5-6173-4E98-8C71-51A3E08325E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/fdcbd9a3-552d-439e-b283-1d3d934889af", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22633.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22633.json index 332dbec63a1..9ff8f7798b9 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22633.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22633.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22633", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-06-13T09:15:16.127", - "lastModified": "2023-06-13T13:00:47.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:40:42.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,80 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.7.0", + "versionEndIncluding": "8.7.6", + "matchCriteriaId": "3BD32B25-76B4-4D6E-BB5C-065070297058" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.8.0", + "versionEndIncluding": "8.8.11", + "matchCriteriaId": "46929BE3-0396-4B8A-9889-9F6CA73FAD4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndIncluding": "9.1.8", + "matchCriteriaId": "4DFD62C8-07EF-4C7C-B18B-414A9C4A2955" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndIncluding": "9.2.6", + "matchCriteriaId": "9331C47E-0CA4-4B2F-A89F-5C0AAEF3ECAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortinac:9.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E12E11B0-E21A-4124-9DF9-FF268BB19813" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortinac:9.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4648F862-AB8C-4B8D-8F2D-5D2641F08845" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "77DE647F-0252-42E2-8BDD-C98DC899C613" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-521", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22639.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22639.json index 13962f060d2..96d1175916f 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22639.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22639.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22639", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-06-13T09:15:16.177", - "lastModified": "2023-06-13T13:00:47.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:40:25.107", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,122 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndIncluding": "1.0.7", + "matchCriteriaId": "22936F53-4480-4011-9211-174D1C507E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.1.0", + "versionEndIncluding": "1.1.6", + "matchCriteriaId": "E6BBF05F-4967-4A2E-A8F8-C2086097148B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.0", + "versionEndIncluding": "1.2.13", + "matchCriteriaId": "33B84D9A-55E3-4146-A55A-ACB507E61B05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndIncluding": "2.0.12", + "matchCriteriaId": "7C1D5E6B-A23E-4A92-B53C-720AFEB1B951" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.8", + "matchCriteriaId": "C83139FA-7195-4171-8BC6-CC4F9379C7C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F5F302F8-482A-4DA9-BDD9-63886B202B52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "91E7F209-D645-48EC-BB5F-E730E55E8EE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiproxy:7.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7028AFDA-6CB5-4DB0-8977-9BA995DE14C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndIncluding": "6.0.17", + "matchCriteriaId": "0135464C-532C-430D-A76C-2FCDE4C991D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndIncluding": "6.2.15", + "matchCriteriaId": "7916D6BB-838E-40A0-9C7F-FBE9ECBA0D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.12", + "matchCriteriaId": "5E99B6E5-7EC3-406C-AFAC-A5E32DE266DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.9", + "matchCriteriaId": "9E775D02-7C02-40BE-A118-D874B9BBC936" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.3", + "matchCriteriaId": "813E179E-B948-4480-A5B1-B0ED562A41BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-494", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23408.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23408.json index 6342698c50a..2c44c6d3bc2 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23408.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23408.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23408", "sourceIdentifier": "secure@microsoft.com", "published": "2023-03-14T17:15:14.220", - "lastModified": "2023-03-20T16:14:45.200", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-17T01:15:40.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -13,7 +13,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -33,18 +33,18 @@ "impactScore": 3.6 }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 4.5, "baseSeverity": "MEDIUM" diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23416.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23416.json index 7b48fc04d64..d0884dda755 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23416.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23416.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23416", "sourceIdentifier": "secure@microsoft.com", "published": "2023-03-14T17:15:14.967", - "lastModified": "2023-03-23T16:55:33.223", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-17T01:15:40.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -13,7 +13,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -33,23 +33,23 @@ "impactScore": 5.9 }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 8.4, + "baseScore": 7.8, "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.5, + "exploitabilityScore": 1.8, "impactScore": 5.9 } ] diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24856.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24856.json index 61dfc9a5faf..111e7ee1ab8 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24856.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24856.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24856", "sourceIdentifier": "secure@microsoft.com", "published": "2023-03-14T17:15:15.837", - "lastModified": "2023-03-20T03:55:15.857", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-17T01:15:40.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -13,7 +13,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -33,23 +33,23 @@ "impactScore": 3.6 }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "baseScore": 7.5, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 3.9, "impactScore": 3.6 } ] diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24921.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24921.json index d7915aa08d2..0c51d08e139 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24921.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24921.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24921", "sourceIdentifier": "secure@microsoft.com", "published": "2023-03-14T17:15:19.133", - "lastModified": "2023-03-17T00:34:10.840", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-17T01:15:40.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -13,7 +13,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -33,24 +33,24 @@ "impactScore": 2.7 }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", - "integrityImpact": "NONE", + "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 4.1, + "baseScore": 5.4, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.3, - "impactScore": 1.4 + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25609.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25609.json index e364b34cb66..2a67ca22fbe 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25609.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25609.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25609", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-06-13T09:15:16.227", - "lastModified": "2023-06-13T13:00:47.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:40:04.447", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,85 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.8", + "versionEndIncluding": "6.4.11", + "matchCriteriaId": "A1422EEA-A01E-4451-ACB4-1EC85FC15E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.6", + "matchCriteriaId": "77DD4559-290F-424D-8696-20AE8FF42714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortianalyzer:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "319D2F9D-E1E5-49C7-8ABD-0A64D7B05D58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortianalyzer:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FDD88F7C-8136-4CFF-AF1E-9AE928878C7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.8", + "versionEndIncluding": "6.4.11", + "matchCriteriaId": "431C5172-EFBC-4E26-AAF5-97A1251A368B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.6", + "matchCriteriaId": "D25913D0-D586-4A59-9723-E26009AD17E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "407755AA-0C23-4C5B-88A2-8BC12A3D268D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortimanager:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0A0A1111-4054-4C7B-B333-E13A8684207B" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-493", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2568.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2568.json index 2665ef31d42..74d6f927e1b 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2568.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2568.json @@ -2,15 +2,38 @@ "id": "CVE-2023-2568", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-12T18:15:10.093", - "lastModified": "2023-06-12T18:22:56.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:38:25.687", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Photo Gallery by Ays WordPress plugin before 5.1.7 does not escape some parameters before outputting it back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ays-pro:photo_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1.7", + "matchCriteriaId": "B711EF8A-5219-4470-A153-79197568B332" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/b1704a12-459b-4f5d-aa2d-a96646ddaf3e", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26204.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26204.json index ea92135513a..3f9b96d770f 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26204.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26204.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26204", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-06-13T09:15:16.417", - "lastModified": "2023-06-13T13:00:42.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:39:19.410", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,120 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3.0", + "versionEndIncluding": "5.3.3", + "matchCriteriaId": "A0258A88-352D-4F9A-894D-F7442CAFE461" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndIncluding": "6.3.3", + "matchCriteriaId": "D9FC4C46-F269-4635-80BE-BED292538FEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.0", + "versionEndIncluding": "6.6.3", + "matchCriteriaId": "EB301503-0ECB-4D21-B341-ACF0F302CF85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7.0", + "versionEndIncluding": "6.7.5", + "matchCriteriaId": "20FD2D69-73DD-4EA4-ADE6-EB4BCFED7AC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91E43A1B-D4C5-4FFF-9D3E-00140023921E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F52E2B2-A3B1-493F-B092-77A2A44E855A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7B16CB79-AC63-41EA-AE9A-D6030449ACD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "912BA146-D840-4855-8C47-AC3D5E6D0C4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "51452B16-AB83-41D3-8779-3E1AEA818AD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3F453DE5-E31D-4BD1-8978-DD6D166045E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C48AC74D-9FBE-4194-9BE8-FD2D6A0EC788" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BFFA27A5-0168-4261-9A04-D2DBB0A9946D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2035DFA0-FF3A-4BBF-ABFE-0E310A7C668B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A391C353-BD26-4262-B86F-E3FBF8915DCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EDD5BE55-0990-4646-ADA7-9A30981D4DF2" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-21-141", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28248.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28248.json index 79bf43bfc45..3a8a06545c8 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28248.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28248.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28248", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:24.803", - "lastModified": "2023-05-11T18:15:12.443", + "lastModified": "2023-06-17T01:15:41.097", "vulnStatus": "Modified", "descriptions": [ { @@ -116,10 +116,6 @@ } ], "references": [ - { - "url": "http://packetstormsecurity.com/files/172283/Windows-Kernel-CmpCleanupLightWeightPrepare-Use-After-Free.html", - "source": "secure@microsoft.com" - }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28248", "source": "secure@microsoft.com", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json index 2182959e366..21cfd1087b5 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28261", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-27T19:15:20.350", - "lastModified": "2023-05-08T13:58:25.660", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-17T01:15:41.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -31,26 +51,6 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 - }, - { - "source": "secure@microsoft.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N", - "attackVector": "LOCAL", - "attackComplexity": "HIGH", - "privilegesRequired": "LOW", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 6.1, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 0.8, - "impactScore": 4.7 } ] }, diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28263.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28263.json index 95fefb84bd0..3110c09c084 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28263.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28263.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28263", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:25.627", - "lastModified": "2023-04-19T15:41:21.227", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-17T01:15:41.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -13,7 +13,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -33,19 +33,19 @@ "impactScore": 3.6 }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", + "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", + "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM" }, diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28271.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28271.json index bdf18294707..8b4666f6876 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28271.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28271.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28271", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:26.120", - "lastModified": "2023-05-11T18:15:12.650", + "lastModified": "2023-06-17T01:15:41.343", "vulnStatus": "Modified", "descriptions": [ { @@ -142,10 +142,6 @@ } ], "references": [ - { - "url": "http://packetstormsecurity.com/files/172298/Windows-Kernel-Uninitialized-Memory-Pointer-Disclosure.html", - "source": "secure@microsoft.com" - }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28271", "source": "secure@microsoft.com", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28287.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28287.json new file mode 100644 index 00000000000..4b64091473c --- /dev/null +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28287.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28287", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-06-17T01:15:41.423", + "lastModified": "2023-06-17T01:15:41.423", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Publisher Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28287", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28288.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28288.json index 50ecf4d86de..1c75dbfd0ee 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28288.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28288.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28288", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:27.017", - "lastModified": "2023-04-19T14:50:09.943", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-17T01:15:41.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", @@ -31,26 +51,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 - }, - { - "source": "secure@microsoft.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28293.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28293.json index c1659daf95f..ca52fa5318f 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28293.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28293.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28293", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:27.317", - "lastModified": "2023-05-11T18:15:12.817", + "lastModified": "2023-06-17T01:15:41.663", "vulnStatus": "Modified", "descriptions": [ { @@ -136,10 +136,6 @@ } ], "references": [ - { - "url": "http://packetstormsecurity.com/files/172300/Windows-Kernel-CmpDoReDoCreateKey-CmpDoReOpenTransKey-Out-Of-Bounds-Read.html", - "source": "secure@microsoft.com" - }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28293", "source": "secure@microsoft.com", diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28295.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28295.json new file mode 100644 index 00000000000..bd4a5d93ba4 --- /dev/null +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28295.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28295", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-06-17T01:15:41.727", + "lastModified": "2023-06-17T01:15:41.727", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Publisher Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28295", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json index afb1b73a23b..3f255be2777 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28301.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28301", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:27.840", - "lastModified": "2023-04-19T20:23:07.317", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-17T01:15:41.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -13,7 +13,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -33,24 +33,24 @@ "impactScore": 1.4 }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", + "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", + "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 4.2, - "baseSeverity": "MEDIUM" + "baseScore": 3.7, + "baseSeverity": "LOW" }, - "exploitabilityScore": 1.6, - "impactScore": 2.5 + "exploitabilityScore": 2.2, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30198.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30198.json index 0d5bb510833..be51c7e8510 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30198.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30198.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30198", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-12T17:15:09.760", - "lastModified": "2023-06-12T18:22:56.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:41:38.440", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -34,14 +54,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webbax:winbizpayment:*:*:*:*:*:prestashop:*:*", + "versionEndIncluding": "1.0.2", + "matchCriteriaId": "2956FF3D-D59C-404D-8BB6-28B4AC8A10A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://friends-of-presta.github.io/security-advisories/modules/2023/06/08/winbizpayment.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/PrestaShop/PrestaShop/blob/6c05518b807d014ee8edb811041e3de232520c28/classes/Tools.php#L1247", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3229.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3229.json index 27f99ec52d0..a103116f489 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3229.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3229.json @@ -2,15 +2,41 @@ "id": "CVE-2023-3229", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-14T06:15:08.877", - "lastModified": "2023-06-14T12:54:19.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-17T01:42:13.593", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Business Logic Errors in GitHub repository fossbilling/fossbilling prior to 0.5.0." + }, + { + "lang": "es", + "value": "Errores de l\u00f3gica empresarial en el repositorio de GitHub fossbilling/fossbilling anterior a 0.5.0." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -46,14 +72,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fossbilling:fossbilling:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.5.0", + "matchCriteriaId": "EFD5D230-F0DE-4BCE-99B7-4074CD4799AA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/fossbilling/fossbilling/commit/56a64fefddf6a0b06304bdd443fdb0bb55423533", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.dev/bounties/31f48ca1-e5e8-436f-b779-cad597759170", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 206aa414824..6e96126e941 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-16T23:55:25.535300+00:00 +2023-06-17T02:00:30.497320+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-16T23:15:08.817000+00:00 +2023-06-17T01:42:13.593000+00:00 ``` ### Last Data Feed Release @@ -23,26 +23,52 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-06-16T00:00:13.573516+00:00 +2023-06-17T00:00:13.563690+00:00 ``` ### Total Number of included CVEs ```plain -217968 +217970 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `2` -* [CVE-2023-34459](CVE-2023/CVE-2023-344xx/CVE-2023-34459.json) (`2023-06-16T23:15:08.817`) +* [CVE-2023-28287](CVE-2023/CVE-2023-282xx/CVE-2023-28287.json) (`2023-06-17T01:15:41.423`) +* [CVE-2023-28295](CVE-2023/CVE-2023-282xx/CVE-2023-28295.json) (`2023-06-17T01:15:41.727`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `28` +* [CVE-2022-42478](CVE-2022/CVE-2022-424xx/CVE-2022-42478.json) (`2023-06-17T01:35:00.727`) +* [CVE-2022-42474](CVE-2022/CVE-2022-424xx/CVE-2022-42474.json) (`2023-06-17T01:37:14.570`) +* [CVE-2022-41327](CVE-2022/CVE-2022-413xx/CVE-2022-41327.json) (`2023-06-17T01:37:49.700`) +* [CVE-2022-33877](CVE-2022/CVE-2022-338xx/CVE-2022-33877.json) (`2023-06-17T01:38:14.087`) +* [CVE-2022-43953](CVE-2022/CVE-2022-439xx/CVE-2022-43953.json) (`2023-06-17T01:40:49.737`) +* [CVE-2022-43949](CVE-2022/CVE-2022-439xx/CVE-2022-43949.json) (`2023-06-17T01:41:21.763`) +* [CVE-2023-23408](CVE-2023/CVE-2023-234xx/CVE-2023-23408.json) (`2023-06-17T01:15:40.703`) +* [CVE-2023-23416](CVE-2023/CVE-2023-234xx/CVE-2023-23416.json) (`2023-06-17T01:15:40.787`) +* [CVE-2023-24856](CVE-2023/CVE-2023-248xx/CVE-2023-24856.json) (`2023-06-17T01:15:40.860`) +* [CVE-2023-24921](CVE-2023/CVE-2023-249xx/CVE-2023-24921.json) (`2023-06-17T01:15:40.987`) +* [CVE-2023-28248](CVE-2023/CVE-2023-282xx/CVE-2023-28248.json) (`2023-06-17T01:15:41.097`) +* [CVE-2023-28261](CVE-2023/CVE-2023-282xx/CVE-2023-28261.json) (`2023-06-17T01:15:41.167`) +* [CVE-2023-28263](CVE-2023/CVE-2023-282xx/CVE-2023-28263.json) (`2023-06-17T01:15:41.280`) +* [CVE-2023-28271](CVE-2023/CVE-2023-282xx/CVE-2023-28271.json) (`2023-06-17T01:15:41.343`) +* [CVE-2023-28288](CVE-2023/CVE-2023-282xx/CVE-2023-28288.json) (`2023-06-17T01:15:41.597`) +* [CVE-2023-28293](CVE-2023/CVE-2023-282xx/CVE-2023-28293.json) (`2023-06-17T01:15:41.663`) +* [CVE-2023-28301](CVE-2023/CVE-2023-283xx/CVE-2023-28301.json) (`2023-06-17T01:15:41.840`) +* [CVE-2023-2568](CVE-2023/CVE-2023-25xx/CVE-2023-2568.json) (`2023-06-17T01:38:25.687`) +* [CVE-2023-0431](CVE-2023/CVE-2023-04xx/CVE-2023-0431.json) (`2023-06-17T01:38:33.253`) +* [CVE-2023-26204](CVE-2023/CVE-2023-262xx/CVE-2023-26204.json) (`2023-06-17T01:39:19.410`) +* [CVE-2023-25609](CVE-2023/CVE-2023-256xx/CVE-2023-25609.json) (`2023-06-17T01:40:04.447`) +* [CVE-2023-22639](CVE-2023/CVE-2023-226xx/CVE-2023-22639.json) (`2023-06-17T01:40:25.107`) +* [CVE-2023-22633](CVE-2023/CVE-2023-226xx/CVE-2023-22633.json) (`2023-06-17T01:40:42.317`) +* [CVE-2023-30198](CVE-2023/CVE-2023-301xx/CVE-2023-30198.json) (`2023-06-17T01:41:38.440`) +* [CVE-2023-3229](CVE-2023/CVE-2023-32xx/CVE-2023-3229.json) (`2023-06-17T01:42:13.593`) ## Download and Usage