mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2023-05-09T21:55:44.778583+00:00
This commit is contained in:
parent
540eb98e58
commit
e6c2ce6273
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-25085",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-01T05:15:08.633",
|
||||
"lastModified": "2023-05-01T10:39:42.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T21:08:40.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
@ -71,26 +93,58 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://git.drupalcode.org/project/responsive_menus/-/commit/3c554b31d32a367188f44d44857b061eac949fb8",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227755",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227755",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.drupal.org/project/responsive_menus/releases/7.x-1.7",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2018-079",
|
||||
"source": "cna@vuldb.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:drupal:responsive_menus:7.x-1.7:*:*:*:*:drupal:*:*",
|
||||
"matchCriteriaId": "630B9B32-8E34-448F-8ABA-AC3A2FEF015E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.drupalcode.org/project/responsive_menus/-/commit/3c554b31d32a367188f44d44857b061eac949fb8",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227755",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227755",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.drupal.org/project/responsive_menus/releases/7.x-1.7",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2018-079",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26354",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.670",
|
||||
"lastModified": "2023-05-09T19:15:10.670",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26356",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.737",
|
||||
"lastModified": "2023-05-09T19:15:10.737",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26365",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.780",
|
||||
"lastModified": "2023-05-09T19:15:10.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26371",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.820",
|
||||
"lastModified": "2023-05-09T19:15:10.820",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26379",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.863",
|
||||
"lastModified": "2023-05-09T19:15:10.863",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26397",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.903",
|
||||
"lastModified": "2023-05-09T19:15:10.903",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26406",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.943",
|
||||
"lastModified": "2023-05-09T19:15:10.943",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-46749",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.997",
|
||||
"lastModified": "2023-05-09T19:15:10.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-46753",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.040",
|
||||
"lastModified": "2023-05-09T19:15:11.040",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2021/CVE-2021-467xx/CVE-2021-46754.json
Normal file
20
CVE-2021/CVE-2021-467xx/CVE-2021-46754.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-46754",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.103",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient input validation in the ASP (AMD\nSecure Processor) bootloader may allow an attacker with a compromised Uapp or\nABL to coerce the bootloader into exposing sensitive information to the SMU\n(System Management Unit) resulting in a potential loss of confidentiality and\nintegrity.\n\n\n\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001",
|
||||
"source": "psirt@amd.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-467xx/CVE-2021-46755.json
Normal file
20
CVE-2021/CVE-2021-467xx/CVE-2021-46755.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-46755",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.157",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Failure to unmap certain SysHub mappings in\nerror paths of the ASP (AMD Secure Processor) bootloader may allow an attacker\nwith a malicious bootloader to exhaust the SysHub resources resulting in a\npotential denial of service.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001",
|
||||
"source": "psirt@amd.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2021/CVE-2021-467xx/CVE-2021-46756.json
Normal file
24
CVE-2021/CVE-2021-467xx/CVE-2021-46756.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2021-46756",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.200",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient validation of inputs in\nSVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an\nattacker with a malicious Uapp or ABL to send malformed or invalid syscall to\nthe bootloader resulting in a potential denial of service and loss of\nintegrity.\n\n\n\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001",
|
||||
"source": "psirt@amd.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001",
|
||||
"source": "psirt@amd.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-467xx/CVE-2021-46759.json
Normal file
20
CVE-2021/CVE-2021-467xx/CVE-2021-46759.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-46759",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.240",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper syscall input validation in AMD TEE\n(Trusted Execution Environment) may allow an attacker with physical access and\ncontrol of a Uapp that runs under the bootloader to reveal the contents of the\nASP (AMD Secure Processor) bootloader accessible memory to a serial port,\nresulting in a potential loss of integrity.\n\n\n\n\n\n\n\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001",
|
||||
"source": "psirt@amd.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-467xx/CVE-2021-46760.json
Normal file
20
CVE-2021/CVE-2021-467xx/CVE-2021-46760.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-46760",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.283",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A malicious or compromised UApp or ABL can send\na malformed system call to the bootloader, which may result in an out-of-bounds\nmemory access that may potentially lead to an attacker leaking sensitive\ninformation or achieving code execution.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001",
|
||||
"source": "psirt@amd.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-46762",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.080",
|
||||
"lastModified": "2023-05-09T19:15:11.080",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-46763",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.123",
|
||||
"lastModified": "2023-05-09T19:15:11.123",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-46764",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.160",
|
||||
"lastModified": "2023-05-09T19:15:11.160",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2021/CVE-2021-467xx/CVE-2021-46765.json
Normal file
20
CVE-2021/CVE-2021-467xx/CVE-2021-46765.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-46765",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.327",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient input validation in ASP may allow\nan attacker with a compromised SMM to induce out-of-bounds memory reads within\nthe ASP, potentially leading to a denial of service.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001",
|
||||
"source": "psirt@amd.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-46769",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.200",
|
||||
"lastModified": "2023-05-09T19:15:11.200",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2021/CVE-2021-467xx/CVE-2021-46773.json
Normal file
20
CVE-2021/CVE-2021-467xx/CVE-2021-46773.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-46773",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.370",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient input validation in ABL may enable\na privileged attacker to corrupt ASP memory, potentially resulting in a loss of\nintegrity or code execution.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001",
|
||||
"source": "psirt@amd.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-46775",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.240",
|
||||
"lastModified": "2023-05-09T19:15:11.240",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2021/CVE-2021-467xx/CVE-2021-46792.json
Normal file
20
CVE-2021/CVE-2021-467xx/CVE-2021-46792.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-46792",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.413",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Time-of-check Time-of-use (TOCTOU) in the\nBIOS2PSP command may allow an attacker with a malicious BIOS to create a race\ncondition causing the ASP bootloader to perform out-of-bounds SRAM reads upon\nan S3 resume event potentially leading to a denial of service.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001",
|
||||
"source": "psirt@amd.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-467xx/CVE-2021-46794.json
Normal file
20
CVE-2021/CVE-2021-467xx/CVE-2021-46794.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-46794",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.463",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient bounds checking in ASP (AMD Secure\nProcessor) may allow for an out of bounds read in SMI (System Management\nInterface) mailbox checksum calculation triggering a data abort, resulting in a\npotential denial of service.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001",
|
||||
"source": "psirt@amd.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-23818",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.367",
|
||||
"lastModified": "2023-05-09T19:15:11.367",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4376",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-03T22:15:15.793",
|
||||
"lastModified": "2023-05-04T13:03:12.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:57:13.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
@ -34,18 +54,72 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4376.json",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/385246",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1794713",
|
||||
"source": "cve@gitlab.com"
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.6.0",
|
||||
"versionEndExcluding": "15.9.6",
|
||||
"matchCriteriaId": "098EA22B-472A-43B5-8373-B60A532739FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.10",
|
||||
"versionEndExcluding": "15.10.5",
|
||||
"matchCriteriaId": "CF774F65-31C6-4F4A-8979-57D1568757E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.11",
|
||||
"versionEndExcluding": "15.11.1",
|
||||
"matchCriteriaId": "324922C6-938D-42CA-BA80-8BEEB29DAEC0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4376.json",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/385246",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1794713",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48186",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-05-01T15:15:09.083",
|
||||
"lastModified": "2023-05-01T20:07:26.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:16:38.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://iknow.lenovo.com.cn/detail/dc_206093.html",
|
||||
"source": "psirt@lenovo.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lenovo:baiying:*:*:*:*:*:android:*:*",
|
||||
"versionEndExcluding": "1.1.4",
|
||||
"matchCriteriaId": "ED3F4201-301E-4160-AAB8-8AFB77AA273D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://iknow.lenovo.com.cn/detail/dc_206093.html",
|
||||
"source": "psirt@lenovo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0756",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-03T22:15:16.073",
|
||||
"lastModified": "2023-05-04T13:03:12.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:55:39.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
@ -34,18 +54,71 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0756.json",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/390910",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1864278",
|
||||
"source": "cve@gitlab.com"
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.9.6",
|
||||
"matchCriteriaId": "1C574941-CFBA-4F52-9375-00D3E4525293"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.10",
|
||||
"versionEndExcluding": "15.10.5",
|
||||
"matchCriteriaId": "CF774F65-31C6-4F4A-8979-57D1568757E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.11",
|
||||
"versionEndExcluding": "15.11.1",
|
||||
"matchCriteriaId": "324922C6-938D-42CA-BA80-8BEEB29DAEC0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0756.json",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/390910",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1864278",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0805",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-03T22:15:16.553",
|
||||
"lastModified": "2023-05-04T13:03:12.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:54:24.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
@ -34,18 +54,72 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0805.json",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/391433",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1850046",
|
||||
"source": "cve@gitlab.com"
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "15.2",
|
||||
"versionEndExcluding": "15.9.6",
|
||||
"matchCriteriaId": "E2E34F11-F5E9-4EEE-954D-D3EEEB3F9AFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "15.10",
|
||||
"versionEndExcluding": "15.10.5",
|
||||
"matchCriteriaId": "4A0D75F4-8D11-4C69-B761-3312B5CDFCE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "15.11",
|
||||
"versionEndExcluding": "15.11.1",
|
||||
"matchCriteriaId": "E7B0DA1F-87DA-411A-8C20-3BF410B6EDB8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0805.json",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/391433",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1850046",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0896",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-05-01T14:15:09.397",
|
||||
"lastModified": "2023-05-01T20:07:36.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:30:04.677",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-113714",
|
||||
"source": "psirt@lenovo.com"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:lenovo:smart_clock_essential_with_alexa_built_in_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "90",
|
||||
"matchCriteriaId": "692395B9-A6BE-4FEF-90D1-457FEA03B689"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:lenovo:smart_clock_essential_with_alexa_built_in:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BB56A47-8209-4227-996D-9439C05715A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-113714",
|
||||
"source": "psirt@lenovo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1178",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-03T22:15:17.027",
|
||||
"lastModified": "2023-05-04T13:03:05.007",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:53:30.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
@ -34,18 +54,94 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1178.json",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/381815",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1778009",
|
||||
"source": "cve@gitlab.com"
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||
"versionStartIncluding": "8.6.0",
|
||||
"versionEndExcluding": "15.9.6",
|
||||
"matchCriteriaId": "C649F4ED-B614-4133-853F-12DE8FD60E37"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "8.6.0",
|
||||
"versionEndExcluding": "15.9.6",
|
||||
"matchCriteriaId": "9C77C875-FEA0-43C4-B7B7-9EA1C6473C69"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||
"versionStartIncluding": "15.10",
|
||||
"versionEndExcluding": "15.10.5",
|
||||
"matchCriteriaId": "128CE092-2826-422E-BE7A-D2DDE15FAFC3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "15.10",
|
||||
"versionEndExcluding": "15.10.5",
|
||||
"matchCriteriaId": "4A0D75F4-8D11-4C69-B761-3312B5CDFCE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||
"versionStartIncluding": "15.11",
|
||||
"versionEndExcluding": "15.11.1",
|
||||
"matchCriteriaId": "C8959805-2A8C-48BE-A0C2-8A1B1049826B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "15.11",
|
||||
"versionEndExcluding": "15.11.1",
|
||||
"matchCriteriaId": "E7B0DA1F-87DA-411A-8C20-3BF410B6EDB8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1178.json",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/381815",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1778009",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1204",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-03T21:15:16.707",
|
||||
"lastModified": "2023-05-04T13:03:12.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:40:07.673",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
@ -34,18 +54,72 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1204.json",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/394745",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1881598",
|
||||
"source": "cve@gitlab.com"
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.0",
|
||||
"versionEndExcluding": "12.9.8",
|
||||
"matchCriteriaId": "97201C83-37F2-46AB-B62A-CC351E6BF563"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.10",
|
||||
"versionEndExcluding": "12.10.7",
|
||||
"matchCriteriaId": "C227F637-E792-4A56-AF4C-81837FDFCA91"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.0.1",
|
||||
"matchCriteriaId": "D5EA4F3B-E5F3-4CFD-AE17-4FDF3FE78535"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1204.json",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/394745",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1881598",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1265",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-03T21:15:17.307",
|
||||
"lastModified": "2023-05-04T13:03:12.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:37:57.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
@ -34,18 +54,72 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1265.json",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/394960",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1888690",
|
||||
"source": "cve@gitlab.com"
|
||||
"lang": "en",
|
||||
"value": "CWE-384"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.9",
|
||||
"versionEndExcluding": "15.9.6",
|
||||
"matchCriteriaId": "A26A6860-E64D-44E7-BFCC-DBD19A6501C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.10",
|
||||
"versionEndExcluding": "15.10.5",
|
||||
"matchCriteriaId": "CF774F65-31C6-4F4A-8979-57D1568757E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.11",
|
||||
"versionEndExcluding": "15.11.1",
|
||||
"matchCriteriaId": "324922C6-938D-42CA-BA80-8BEEB29DAEC0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1265.json",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/394960",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1888690",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1836",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-03T21:15:17.807",
|
||||
"lastModified": "2023-05-04T13:03:12.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:12:36.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
@ -34,18 +54,72 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1836.json",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/404613",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1923293",
|
||||
"source": "cve@gitlab.com"
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||
"versionStartIncluding": "5.1",
|
||||
"versionEndExcluding": "15.9.6",
|
||||
"matchCriteriaId": "06A634B5-D0D2-49D4-B119-0F69CF07D016"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||
"versionStartIncluding": "15.10",
|
||||
"versionEndExcluding": "15.10.5",
|
||||
"matchCriteriaId": "128CE092-2826-422E-BE7A-D2DDE15FAFC3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
|
||||
"versionStartIncluding": "15.11",
|
||||
"versionEndExcluding": "15.11.1",
|
||||
"matchCriteriaId": "C8959805-2A8C-48BE-A0C2-8A1B1049826B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1836.json",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/404613",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1923293",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1965",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-03T21:15:18.220",
|
||||
"lastModified": "2023-05-04T13:03:12.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:36:14.007",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
@ -34,18 +54,72 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1965.json",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/406235",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1923672",
|
||||
"source": "cve@gitlab.com"
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "14.2",
|
||||
"versionEndExcluding": "15.9.6",
|
||||
"matchCriteriaId": "25ED245F-8280-4467-A6C1-33F5CA94AC72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "15.10",
|
||||
"versionEndExcluding": "15.10.5",
|
||||
"matchCriteriaId": "4A0D75F4-8D11-4C69-B761-3312B5CDFCE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "15.11",
|
||||
"versionEndExcluding": "15.11.1",
|
||||
"matchCriteriaId": "E7B0DA1F-87DA-411A-8C20-3BF410B6EDB8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1965.json",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/406235",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1923672",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1968",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-04-28T19:15:16.647",
|
||||
"lastModified": "2023-04-28T22:22:40.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:06:54.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
@ -46,14 +76,352 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://support.illumina.com/downloads/illumina-universal-copy-service-1-0.html",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:iscan_firmware:4.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5000279-D40B-4526-B911-9E0641736EE1"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-117-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:iscan_firmware:4.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD7BE281-02B5-4B87-A7E2-D0E3BB5309CF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:illumina:iscan:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08732A94-734B-486E-AB2C-A2E2CA3C66AE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:iseq_100_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D22304CE-8F36-4B51-BAA2-E2C564C04CDF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:illumina:iseq_100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0136ED72-BF05-404D-910A-DA5B73F69771"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:miniseq_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0",
|
||||
"matchCriteriaId": "E4B7C1F7-D185-4C72-B23C-A21103267CD6"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:illumina:miniseq:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2DA69772-E795-4A64-A6A1-0BDD503D263B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:miseq_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"matchCriteriaId": "CC028805-6ED3-455B-8F4C-95A8B8C5E756"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:illumina:miseq:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AFB0D5A-AF5A-4A84-963F-C6307ADCFF4E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:miseqdx_firmware:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "4.0.1",
|
||||
"matchCriteriaId": "E97A49E3-4B87-4FE5-8FD4-5B36C61A0650"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:miseqdx_firmware:4.0:*:*:*:ruo:*:*:*",
|
||||
"matchCriteriaId": "BE1CBD4E-42B1-42C6-9B3F-4F715A5DBF6D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:illumina:miseqdx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CBD56D9E-B16C-4ED4-A2E4-E73A3A9A599B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:nextseq_500_firmware:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22E34BB5-591C-4889-851E-9A66212C8B8C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:illumina:nextseq_500:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C7AEA5A-707D-4BF4-9DF6-BDE6E6D97B60"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:nextseq_550_firmware:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0D02B5D-7E8A-41CD-BE27-5B012BE5C016"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:illumina:nextseq_550:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF742B4D-0FC5-443A-8040-7B0A1B298707"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:nextseq_550dx_firmware:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "1.0.0",
|
||||
"versionEndIncluding": "1.3.1",
|
||||
"matchCriteriaId": "93DC004D-271D-4075-9828-E88CD7FFC403"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:nextseq_550dx_firmware:*:*:*:*:-:*:*:*",
|
||||
"versionStartIncluding": "1.3.3",
|
||||
"matchCriteriaId": "E199B789-BF31-40AC-B15E-31A97257002B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:nextseq_550dx_firmware:4.0:*:*:*:ruo:*:*:*",
|
||||
"matchCriteriaId": "78D581A6-38A5-4F0A-A5CB-B25A9337EE78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:illumina:nextseq_550dx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3D5AB9D-7EAA-45F2-A10F-A2D142B20D3D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:nextseq_1000_firmware:1.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94B82675-AA38-4584-82BD-9C376F80EA49"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:illumina:nextseq_1000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93589C3C-F577-4C67-962F-166E28911ED2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:nextseq_2000_firmware:1.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6671E6F8-85D5-4970-98FE-6189C8F98852"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:illumina:nextseq_2000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "753D8FDF-5D25-46B9-8E66-30FB8E8A9A87"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:novaseq_6000_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.7",
|
||||
"matchCriteriaId": "3A429D26-AF22-4AC2-AB02-76C72B9B9B05"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:illumina:novaseq_6000_firmware:1.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4C702B1-4BAD-4E32-9659-D9F5C3F2F922"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:illumina:novaseq_6000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D879686-89E7-4152-AEF9-DC8A33FDA4A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.illumina.com/downloads/illumina-universal-copy-service-1-0.html",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-117-01",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20520",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.507",
|
||||
"lastModified": "2023-05-09T19:15:11.507",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20524",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.550",
|
||||
"lastModified": "2023-05-09T19:15:11.550",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-09T20:27:45.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2182",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-03T22:15:19.513",
|
||||
"lastModified": "2023-05-04T13:03:05.007",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:47:13.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
@ -34,14 +54,57 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2182.json",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/403012",
|
||||
"source": "cve@gitlab.com"
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "15.10.0",
|
||||
"versionEndExcluding": "15.10.5",
|
||||
"matchCriteriaId": "1A3B26FC-86C2-400D-8025-C4C6E2949549"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gitlab:gitlab:15.11.0:*:*:*:enterprise:*:*:*",
|
||||
"matchCriteriaId": "49CD6C7F-81E5-422B-B29C-0C63B8FDF431"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2182.json",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/403012",
|
||||
"source": "cve@gitlab.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22637",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-05-03T22:15:17.337",
|
||||
"lastModified": "2023-05-04T13:03:05.007",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:45:27.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
@ -34,10 +54,49 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-013",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.7.0",
|
||||
"versionEndExcluding": "9.4.3",
|
||||
"matchCriteriaId": "FD2141D0-A01A-471E-8FF3-D132897921E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "77DE647F-0252-42E2-8BDD-C98DC899C613"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-013",
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
59
CVE-2023/CVE-2023-258xx/CVE-2023-25831.json
Normal file
59
CVE-2023/CVE-2023-258xx/CVE-2023-25831.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-25831",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2023-05-09T21:15:11.513",
|
||||
"lastModified": "2023-05-09T21:15:11.513",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1, 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095",
|
||||
"source": "psirt@esri.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/",
|
||||
"source": "psirt@esri.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-258xx/CVE-2023-25832.json
Normal file
59
CVE-2023/CVE-2023-258xx/CVE-2023-25832.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-25832",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2023-05-09T21:15:11.590",
|
||||
"lastModified": "2023-05-09T21:15:11.590",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a cross-site-request forgery vulnerability in Esri Portal for ArcGIS Versions 11.0 and below that may allow an attacker to trick an authorized user into executing unwanted actions.\u00a0"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@esri.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095",
|
||||
"source": "psirt@esri.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/",
|
||||
"source": "psirt@esri.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,94 @@
|
||||
"id": "CVE-2023-29778",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T20:15:10.813",
|
||||
"lastModified": "2023-05-03T10:33:50.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T21:00:51.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GL.iNET MT3000 4.1.0 Release 2 is vulnerable to OS Command Injection via /usr/lib/oui-httpd/rpc/logread."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "http://glinet.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://github.com/OlivierLaflamme/cve/blob/main/GL.iNET/MT3000/get_nginx_log_RCE.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:gl-inet:gl-mt3000_firmware:4.1.0:release_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "828261AE-6FED-4663-A030-3CD6230A4ADD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D832083-488B-40F2-8D7A-66E917DF67F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://glinet.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OlivierLaflamme/cve/blob/main/GL.iNET/MT3000/get_nginx_log_RCE.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-300xx/CVE-2023-30056.json
Normal file
28
CVE-2023/CVE-2023-300xx/CVE-2023-30056.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-30056",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-09T21:15:11.673",
|
||||
"lastModified": "2023-05-09T21:15:11.673",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A session takeover vulnerability exists in FICO Origination Manager Decision Module 4.8.1 due to insufficient protection of the JSESSIONID cookie."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://fico.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://origination.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-300xx/CVE-2023-30057.json
Normal file
28
CVE-2023/CVE-2023-300xx/CVE-2023-30057.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-30057",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-09T21:15:11.717",
|
||||
"lastModified": "2023-05-09T21:15:11.717",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in FICO Origination Manager Decision Module 4.8.1 allow attackers to execute arbitrary web scripts or HTML via a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://fico.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://origination.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,80 @@
|
||||
"id": "CVE-2023-31433",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T20:15:11.080",
|
||||
"lastModified": "2023-05-03T10:33:46.147",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-09T20:46:59.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection issue in Logbuch in evasys before 8.2 Build 2286 and 9.x before 9.0 Build 2401 allows authenticated attackers to execute SQL statements via the welche parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://cves.at/posts/cve-2023-31433/writeup/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:evasys:evasys:8.2:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "121D8E08-632A-4DC6-A0BF-42FFA07BDFA8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:evasys:evasys:9.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29035721-2E02-440C-A59D-C19748D922D2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cves.at/posts/cve-2023-31433/writeup/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
146
README.md
146
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-05-09T20:00:32.334537+00:00
|
||||
2023-05-09T21:55:44.778583+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-05-09T19:58:32.077000+00:00
|
||||
2023-05-09T21:15:11.717000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,108 +29,66 @@ Download and Changelog: [Click](releases/latest)
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
214637
|
||||
214650
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `58`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
* [CVE-2021-26354](CVE-2021/CVE-2021-263xx/CVE-2021-26354.json) (`2023-05-09T19:15:10.670`)
|
||||
* [CVE-2021-26356](CVE-2021/CVE-2021-263xx/CVE-2021-26356.json) (`2023-05-09T19:15:10.737`)
|
||||
* [CVE-2021-26365](CVE-2021/CVE-2021-263xx/CVE-2021-26365.json) (`2023-05-09T19:15:10.780`)
|
||||
* [CVE-2021-26371](CVE-2021/CVE-2021-263xx/CVE-2021-26371.json) (`2023-05-09T19:15:10.820`)
|
||||
* [CVE-2021-26379](CVE-2021/CVE-2021-263xx/CVE-2021-26379.json) (`2023-05-09T19:15:10.863`)
|
||||
* [CVE-2021-26397](CVE-2021/CVE-2021-263xx/CVE-2021-26397.json) (`2023-05-09T19:15:10.903`)
|
||||
* [CVE-2021-26406](CVE-2021/CVE-2021-264xx/CVE-2021-26406.json) (`2023-05-09T19:15:10.943`)
|
||||
* [CVE-2021-46749](CVE-2021/CVE-2021-467xx/CVE-2021-46749.json) (`2023-05-09T19:15:10.997`)
|
||||
* [CVE-2021-46753](CVE-2021/CVE-2021-467xx/CVE-2021-46753.json) (`2023-05-09T19:15:11.040`)
|
||||
* [CVE-2021-46762](CVE-2021/CVE-2021-467xx/CVE-2021-46762.json) (`2023-05-09T19:15:11.080`)
|
||||
* [CVE-2021-46763](CVE-2021/CVE-2021-467xx/CVE-2021-46763.json) (`2023-05-09T19:15:11.123`)
|
||||
* [CVE-2021-46764](CVE-2021/CVE-2021-467xx/CVE-2021-46764.json) (`2023-05-09T19:15:11.160`)
|
||||
* [CVE-2021-46769](CVE-2021/CVE-2021-467xx/CVE-2021-46769.json) (`2023-05-09T19:15:11.200`)
|
||||
* [CVE-2021-46775](CVE-2021/CVE-2021-467xx/CVE-2021-46775.json) (`2023-05-09T19:15:11.240`)
|
||||
* [CVE-2022-23818](CVE-2022/CVE-2022-238xx/CVE-2022-23818.json) (`2023-05-09T19:15:11.367`)
|
||||
* [CVE-2023-20046](CVE-2023/CVE-2023-200xx/CVE-2023-20046.json) (`2023-05-09T18:15:11.697`)
|
||||
* [CVE-2023-20098](CVE-2023/CVE-2023-200xx/CVE-2023-20098.json) (`2023-05-09T18:15:11.760`)
|
||||
* [CVE-2023-20520](CVE-2023/CVE-2023-205xx/CVE-2023-20520.json) (`2023-05-09T19:15:11.507`)
|
||||
* [CVE-2023-20524](CVE-2023/CVE-2023-205xx/CVE-2023-20524.json) (`2023-05-09T19:15:11.550`)
|
||||
* [CVE-2023-24898](CVE-2023/CVE-2023-248xx/CVE-2023-24898.json) (`2023-05-09T18:15:11.913`)
|
||||
* [CVE-2023-24899](CVE-2023/CVE-2023-248xx/CVE-2023-24899.json) (`2023-05-09T18:15:11.970`)
|
||||
* [CVE-2023-24900](CVE-2023/CVE-2023-249xx/CVE-2023-24900.json) (`2023-05-09T18:15:12.033`)
|
||||
* [CVE-2023-24901](CVE-2023/CVE-2023-249xx/CVE-2023-24901.json) (`2023-05-09T18:15:12.097`)
|
||||
* [CVE-2023-24902](CVE-2023/CVE-2023-249xx/CVE-2023-24902.json) (`2023-05-09T18:15:12.157`)
|
||||
* [CVE-2023-24903](CVE-2023/CVE-2023-249xx/CVE-2023-24903.json) (`2023-05-09T18:15:12.217`)
|
||||
* [CVE-2023-24904](CVE-2023/CVE-2023-249xx/CVE-2023-24904.json) (`2023-05-09T18:15:12.280`)
|
||||
* [CVE-2023-24905](CVE-2023/CVE-2023-249xx/CVE-2023-24905.json) (`2023-05-09T18:15:12.347`)
|
||||
* [CVE-2023-24932](CVE-2023/CVE-2023-249xx/CVE-2023-24932.json) (`2023-05-09T18:15:12.407`)
|
||||
* [CVE-2023-24939](CVE-2023/CVE-2023-249xx/CVE-2023-24939.json) (`2023-05-09T18:15:12.467`)
|
||||
* [CVE-2023-24940](CVE-2023/CVE-2023-249xx/CVE-2023-24940.json) (`2023-05-09T18:15:12.527`)
|
||||
* [CVE-2023-24941](CVE-2023/CVE-2023-249xx/CVE-2023-24941.json) (`2023-05-09T18:15:12.587`)
|
||||
* [CVE-2023-24942](CVE-2023/CVE-2023-249xx/CVE-2023-24942.json) (`2023-05-09T18:15:12.643`)
|
||||
* [CVE-2023-24943](CVE-2023/CVE-2023-249xx/CVE-2023-24943.json) (`2023-05-09T18:15:12.720`)
|
||||
* [CVE-2023-24944](CVE-2023/CVE-2023-249xx/CVE-2023-24944.json) (`2023-05-09T18:15:12.780`)
|
||||
* [CVE-2023-24945](CVE-2023/CVE-2023-249xx/CVE-2023-24945.json) (`2023-05-09T18:15:12.840`)
|
||||
* [CVE-2023-24946](CVE-2023/CVE-2023-249xx/CVE-2023-24946.json) (`2023-05-09T18:15:12.900`)
|
||||
* [CVE-2023-24947](CVE-2023/CVE-2023-249xx/CVE-2023-24947.json) (`2023-05-09T18:15:12.960`)
|
||||
* [CVE-2023-24948](CVE-2023/CVE-2023-249xx/CVE-2023-24948.json) (`2023-05-09T18:15:13.017`)
|
||||
* [CVE-2023-24949](CVE-2023/CVE-2023-249xx/CVE-2023-24949.json) (`2023-05-09T18:15:13.080`)
|
||||
* [CVE-2023-24950](CVE-2023/CVE-2023-249xx/CVE-2023-24950.json) (`2023-05-09T18:15:13.143`)
|
||||
* [CVE-2023-24953](CVE-2023/CVE-2023-249xx/CVE-2023-24953.json) (`2023-05-09T18:15:13.203`)
|
||||
* [CVE-2023-24954](CVE-2023/CVE-2023-249xx/CVE-2023-24954.json) (`2023-05-09T18:15:13.260`)
|
||||
* [CVE-2023-24955](CVE-2023/CVE-2023-249xx/CVE-2023-24955.json) (`2023-05-09T18:15:13.317`)
|
||||
* [CVE-2023-2609](CVE-2023/CVE-2023-26xx/CVE-2023-2609.json) (`2023-05-09T18:15:14.147`)
|
||||
* [CVE-2023-28251](CVE-2023/CVE-2023-282xx/CVE-2023-28251.json) (`2023-05-09T18:15:13.433`)
|
||||
* [CVE-2023-28283](CVE-2023/CVE-2023-282xx/CVE-2023-28283.json) (`2023-05-09T18:15:13.490`)
|
||||
* [CVE-2023-28290](CVE-2023/CVE-2023-282xx/CVE-2023-28290.json) (`2023-05-09T18:15:13.547`)
|
||||
* [CVE-2023-29324](CVE-2023/CVE-2023-293xx/CVE-2023-29324.json) (`2023-05-09T18:15:13.607`)
|
||||
* [CVE-2023-29325](CVE-2023/CVE-2023-293xx/CVE-2023-29325.json) (`2023-05-09T18:15:13.667`)
|
||||
* [CVE-2023-29333](CVE-2023/CVE-2023-293xx/CVE-2023-29333.json) (`2023-05-09T18:15:13.727`)
|
||||
* [CVE-2023-29335](CVE-2023/CVE-2023-293xx/CVE-2023-29335.json) (`2023-05-09T18:15:13.783`)
|
||||
* [CVE-2023-29336](CVE-2023/CVE-2023-293xx/CVE-2023-29336.json) (`2023-05-09T18:15:13.840`)
|
||||
* [CVE-2023-29338](CVE-2023/CVE-2023-293xx/CVE-2023-29338.json) (`2023-05-09T18:15:13.900`)
|
||||
* [CVE-2023-29340](CVE-2023/CVE-2023-293xx/CVE-2023-29340.json) (`2023-05-09T18:15:13.967`)
|
||||
* [CVE-2023-29341](CVE-2023/CVE-2023-293xx/CVE-2023-29341.json) (`2023-05-09T18:15:14.027`)
|
||||
* [CVE-2023-29343](CVE-2023/CVE-2023-293xx/CVE-2023-29343.json) (`2023-05-09T18:15:14.087`)
|
||||
* [CVE-2023-31472](CVE-2023/CVE-2023-314xx/CVE-2023-31472.json) (`2023-05-09T18:15:14.283`)
|
||||
* [CVE-2023-31474](CVE-2023/CVE-2023-314xx/CVE-2023-31474.json) (`2023-05-09T18:15:14.323`)
|
||||
* [CVE-2021-46754](CVE-2021/CVE-2021-467xx/CVE-2021-46754.json) (`2023-05-09T20:15:12.103`)
|
||||
* [CVE-2021-46755](CVE-2021/CVE-2021-467xx/CVE-2021-46755.json) (`2023-05-09T20:15:12.157`)
|
||||
* [CVE-2021-46756](CVE-2021/CVE-2021-467xx/CVE-2021-46756.json) (`2023-05-09T20:15:12.200`)
|
||||
* [CVE-2021-46759](CVE-2021/CVE-2021-467xx/CVE-2021-46759.json) (`2023-05-09T20:15:12.240`)
|
||||
* [CVE-2021-46760](CVE-2021/CVE-2021-467xx/CVE-2021-46760.json) (`2023-05-09T20:15:12.283`)
|
||||
* [CVE-2021-46765](CVE-2021/CVE-2021-467xx/CVE-2021-46765.json) (`2023-05-09T20:15:12.327`)
|
||||
* [CVE-2021-46773](CVE-2021/CVE-2021-467xx/CVE-2021-46773.json) (`2023-05-09T20:15:12.370`)
|
||||
* [CVE-2021-46792](CVE-2021/CVE-2021-467xx/CVE-2021-46792.json) (`2023-05-09T20:15:12.413`)
|
||||
* [CVE-2021-46794](CVE-2021/CVE-2021-467xx/CVE-2021-46794.json) (`2023-05-09T20:15:12.463`)
|
||||
* [CVE-2023-25831](CVE-2023/CVE-2023-258xx/CVE-2023-25831.json) (`2023-05-09T21:15:11.513`)
|
||||
* [CVE-2023-25832](CVE-2023/CVE-2023-258xx/CVE-2023-25832.json) (`2023-05-09T21:15:11.590`)
|
||||
* [CVE-2023-30056](CVE-2023/CVE-2023-300xx/CVE-2023-30056.json) (`2023-05-09T21:15:11.673`)
|
||||
* [CVE-2023-30057](CVE-2023/CVE-2023-300xx/CVE-2023-30057.json) (`2023-05-09T21:15:11.717`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `31`
|
||||
Recently modified CVEs: `34`
|
||||
|
||||
* [CVE-2021-42847](CVE-2021/CVE-2021-428xx/CVE-2021-42847.json) (`2023-05-09T18:15:11.397`)
|
||||
* [CVE-2022-20929](CVE-2022/CVE-2022-209xx/CVE-2022-20929.json) (`2023-05-09T18:15:11.500`)
|
||||
* [CVE-2022-21229](CVE-2022/CVE-2022-212xx/CVE-2022-21229.json) (`2023-05-09T19:15:11.283`)
|
||||
* [CVE-2022-25273](CVE-2022/CVE-2022-252xx/CVE-2022-25273.json) (`2023-05-09T18:47:56.107`)
|
||||
* [CVE-2022-25274](CVE-2022/CVE-2022-252xx/CVE-2022-25274.json) (`2023-05-09T19:11:17.407`)
|
||||
* [CVE-2022-25277](CVE-2022/CVE-2022-252xx/CVE-2022-25277.json) (`2023-05-09T19:26:40.053`)
|
||||
* [CVE-2022-25772](CVE-2022/CVE-2022-257xx/CVE-2022-25772.json) (`2023-05-09T19:15:11.413`)
|
||||
* [CVE-2022-28888](CVE-2022/CVE-2022-288xx/CVE-2022-28888.json) (`2023-05-09T18:15:11.600`)
|
||||
* [CVE-2022-33273](CVE-2022/CVE-2022-332xx/CVE-2022-33273.json) (`2023-05-09T18:33:28.843`)
|
||||
* [CVE-2022-45801](CVE-2022/CVE-2022-458xx/CVE-2022-45801.json) (`2023-05-09T18:09:27.697`)
|
||||
* [CVE-2022-45802](CVE-2022/CVE-2022-458xx/CVE-2022-45802.json) (`2023-05-09T18:10:43.900`)
|
||||
* [CVE-2022-46365](CVE-2022/CVE-2022-463xx/CVE-2022-46365.json) (`2023-05-09T18:04:19.747`)
|
||||
* [CVE-2022-47877](CVE-2022/CVE-2022-478xx/CVE-2022-47877.json) (`2023-05-09T19:42:15.130`)
|
||||
* [CVE-2023-0155](CVE-2023/CVE-2023-01xx/CVE-2023-0155.json) (`2023-05-09T19:53:24.107`)
|
||||
* [CVE-2023-0485](CVE-2023/CVE-2023-04xx/CVE-2023-0485.json) (`2023-05-09T19:53:10.287`)
|
||||
* [CVE-2023-1477](CVE-2023/CVE-2023-14xx/CVE-2023-1477.json) (`2023-05-09T19:38:42.500`)
|
||||
* [CVE-2023-2069](CVE-2023/CVE-2023-20xx/CVE-2023-2069.json) (`2023-05-09T19:58:32.077`)
|
||||
* [CVE-2023-2247](CVE-2023/CVE-2023-22xx/CVE-2023-2247.json) (`2023-05-09T18:23:24.153`)
|
||||
* [CVE-2023-2479](CVE-2023/CVE-2023-24xx/CVE-2023-2479.json) (`2023-05-09T18:48:53.560`)
|
||||
* [CVE-2023-24892](CVE-2023/CVE-2023-248xx/CVE-2023-24892.json) (`2023-05-09T18:15:11.823`)
|
||||
* [CVE-2023-27568](CVE-2023/CVE-2023-275xx/CVE-2023-27568.json) (`2023-05-09T18:15:13.370`)
|
||||
* [CVE-2023-29772](CVE-2023/CVE-2023-297xx/CVE-2023-29772.json) (`2023-05-09T18:40:44.477`)
|
||||
* [CVE-2023-29918](CVE-2023/CVE-2023-299xx/CVE-2023-29918.json) (`2023-05-09T19:27:09.447`)
|
||||
* [CVE-2023-30204](CVE-2023/CVE-2023-302xx/CVE-2023-30204.json) (`2023-05-09T19:43:20.183`)
|
||||
* [CVE-2023-30268](CVE-2023/CVE-2023-302xx/CVE-2023-30268.json) (`2023-05-09T18:15:14.210`)
|
||||
* [CVE-2023-30838](CVE-2023/CVE-2023-308xx/CVE-2023-30838.json) (`2023-05-09T19:46:44.303`)
|
||||
* [CVE-2023-30847](CVE-2023/CVE-2023-308xx/CVE-2023-30847.json) (`2023-05-09T18:21:39.807`)
|
||||
* [CVE-2023-30850](CVE-2023/CVE-2023-308xx/CVE-2023-30850.json) (`2023-05-09T18:18:04.593`)
|
||||
* [CVE-2023-30859](CVE-2023/CVE-2023-308xx/CVE-2023-30859.json) (`2023-05-09T19:01:26.460`)
|
||||
* [CVE-2023-30869](CVE-2023/CVE-2023-308xx/CVE-2023-30869.json) (`2023-05-09T18:25:38.057`)
|
||||
* [CVE-2023-31207](CVE-2023/CVE-2023-312xx/CVE-2023-31207.json) (`2023-05-09T19:21:42.800`)
|
||||
* [CVE-2018-25085](CVE-2018/CVE-2018-250xx/CVE-2018-25085.json) (`2023-05-09T21:08:40.580`)
|
||||
* [CVE-2021-26354](CVE-2021/CVE-2021-263xx/CVE-2021-26354.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-26356](CVE-2021/CVE-2021-263xx/CVE-2021-26356.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-26365](CVE-2021/CVE-2021-263xx/CVE-2021-26365.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-26371](CVE-2021/CVE-2021-263xx/CVE-2021-26371.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-26379](CVE-2021/CVE-2021-263xx/CVE-2021-26379.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-26397](CVE-2021/CVE-2021-263xx/CVE-2021-26397.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-26406](CVE-2021/CVE-2021-264xx/CVE-2021-26406.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-46749](CVE-2021/CVE-2021-467xx/CVE-2021-46749.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-46753](CVE-2021/CVE-2021-467xx/CVE-2021-46753.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-46762](CVE-2021/CVE-2021-467xx/CVE-2021-46762.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-46763](CVE-2021/CVE-2021-467xx/CVE-2021-46763.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-46764](CVE-2021/CVE-2021-467xx/CVE-2021-46764.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-46769](CVE-2021/CVE-2021-467xx/CVE-2021-46769.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2021-46775](CVE-2021/CVE-2021-467xx/CVE-2021-46775.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2022-23818](CVE-2022/CVE-2022-238xx/CVE-2022-23818.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2022-4376](CVE-2022/CVE-2022-43xx/CVE-2022-4376.json) (`2023-05-09T20:57:13.993`)
|
||||
* [CVE-2022-48186](CVE-2022/CVE-2022-481xx/CVE-2022-48186.json) (`2023-05-09T20:16:38.417`)
|
||||
* [CVE-2023-0756](CVE-2023/CVE-2023-07xx/CVE-2023-0756.json) (`2023-05-09T20:55:39.123`)
|
||||
* [CVE-2023-0805](CVE-2023/CVE-2023-08xx/CVE-2023-0805.json) (`2023-05-09T20:54:24.150`)
|
||||
* [CVE-2023-0896](CVE-2023/CVE-2023-08xx/CVE-2023-0896.json) (`2023-05-09T20:30:04.677`)
|
||||
* [CVE-2023-1178](CVE-2023/CVE-2023-11xx/CVE-2023-1178.json) (`2023-05-09T20:53:30.140`)
|
||||
* [CVE-2023-1204](CVE-2023/CVE-2023-12xx/CVE-2023-1204.json) (`2023-05-09T20:40:07.673`)
|
||||
* [CVE-2023-1265](CVE-2023/CVE-2023-12xx/CVE-2023-1265.json) (`2023-05-09T20:37:57.913`)
|
||||
* [CVE-2023-1836](CVE-2023/CVE-2023-18xx/CVE-2023-1836.json) (`2023-05-09T20:12:36.977`)
|
||||
* [CVE-2023-1965](CVE-2023/CVE-2023-19xx/CVE-2023-1965.json) (`2023-05-09T20:36:14.007`)
|
||||
* [CVE-2023-1968](CVE-2023/CVE-2023-19xx/CVE-2023-1968.json) (`2023-05-09T20:06:54.500`)
|
||||
* [CVE-2023-20520](CVE-2023/CVE-2023-205xx/CVE-2023-20520.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2023-20524](CVE-2023/CVE-2023-205xx/CVE-2023-20524.json) (`2023-05-09T20:27:45.710`)
|
||||
* [CVE-2023-2182](CVE-2023/CVE-2023-21xx/CVE-2023-2182.json) (`2023-05-09T20:47:13.967`)
|
||||
* [CVE-2023-22637](CVE-2023/CVE-2023-226xx/CVE-2023-22637.json) (`2023-05-09T20:45:27.123`)
|
||||
* [CVE-2023-25495](CVE-2023/CVE-2023-254xx/CVE-2023-25495.json) (`2023-05-09T20:36:34.067`)
|
||||
* [CVE-2023-29778](CVE-2023/CVE-2023-297xx/CVE-2023-29778.json) (`2023-05-09T21:00:51.857`)
|
||||
* [CVE-2023-31433](CVE-2023/CVE-2023-314xx/CVE-2023-31433.json) (`2023-05-09T20:46:59.023`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user