mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2023-04-27T16:00:23.761077+00:00
This commit is contained in:
parent
da0d2b5f9e
commit
ea7460621c
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-13263",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-08-27T18:15:10.623",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"lastModified": "2023-04-27T14:29:10.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-825\\/ac_g1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88E54F34-DDC3-4EFF-AC3D-07A90FB79A46"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-825\\/ac_g1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41985D42-D288-40A9-8B1D-6B873FCD76E7"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -96,8 +96,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-825\\/ac_g1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05B4CE96-EC2A-408C-B641-0A3C812D3414"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825\\/ac_g1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D400249-8E33-41C7-BEC6-7798BAEBBBF6"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-13264",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-08-27T18:15:10.717",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"lastModified": "2023-04-27T14:29:21.177",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-825\\/ac_g1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88E54F34-DDC3-4EFF-AC3D-07A90FB79A46"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-825\\/ac_g1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41985D42-D288-40A9-8B1D-6B873FCD76E7"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -96,8 +96,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-825\\/ac_g1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05B4CE96-EC2A-408C-B641-0A3C812D3414"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825\\/ac_g1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D400249-8E33-41C7-BEC6-7798BAEBBBF6"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-13265",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-08-27T18:15:10.780",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"lastModified": "2023-04-27T14:30:15.520",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-825\\/ac_g1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88E54F34-DDC3-4EFF-AC3D-07A90FB79A46"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-825\\/ac_g1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41985D42-D288-40A9-8B1D-6B873FCD76E7"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -96,8 +96,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-825\\/ac_g1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05B4CE96-EC2A-408C-B641-0A3C812D3414"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825\\/ac_g1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D400249-8E33-41C7-BEC6-7798BAEBBBF6"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-9122",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-02-25T05:29:00.817",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"lastModified": "2023-04-27T14:30:48.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-825_rev.b_firmware:2.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5223C4FF-FA63-41CE-BD4C-0880F07F0635"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-825_rev.b_firmware:2.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CFFFA7B9-BD99-4E85-8F45-32B46F6FAEFE"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -96,8 +96,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-825_rev.b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5EB8EE3-D483-40AD-94DD-13CD94F83809"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825_rev.b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CDEF189-EEEF-40C9-BE55-9A051D783CDC"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-29557",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-01-29T20:15:12.933",
|
||||
"lastModified": "2022-07-12T17:42:04.277",
|
||||
"lastModified": "2023-04-27T14:31:11.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2022-05-03",
|
||||
@ -89,9 +89,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-825_r1_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-825_r1_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.0.1",
|
||||
"matchCriteriaId": "18E42EAC-012C-454D-B262-D51A698F95C2"
|
||||
"matchCriteriaId": "34DB7F07-2D64-4532-BF64-28BA4B19ED89"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -101,33 +101,33 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-825:r1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B05CD6DF-3653-4736-998D-0D696572BF1F"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825:r1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20E00B08-C149-4F58-8D9F-70F51094ABA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-825\\/a:d1a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E1B7D4D-9005-4878-963C-37BFD71FE811"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825\\/a:d1a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D166832F-323A-4D97-A0BC-BC1C5FFABC15"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-825\\/ac:e:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1FECA95-7DC0-4E45-89FA-BE846E3429EC"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825\\/ac:e:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "31A2917E-3DD9-4744-B46B-D82119DC986F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-825\\/ac:e1a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9EE45CDE-5E2D-4716-BAD1-FBAF2345F3DF"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825\\/ac:e1a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8723A1A3-66F8-4393-8AD2-799E6960058D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-825\\/acf:f1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "594111EC-17C1-4C14-AB0C-573626DC242B"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825\\/acf:f1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60BA2C90-EF68-4AC3-B09C-7CECDE2A891E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-825\\/gf:gf:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E54F1E6-7226-474C-A9CA-D7AC9DCF0083"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825\\/gf:gf:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB58664E-6140-4B48-988E-C13391AC7166"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-39537",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-09-20T16:15:12.477",
|
||||
"lastModified": "2022-12-07T01:38:22.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:09.233",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -176,6 +176,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0012/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213443",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,23 +2,95 @@
|
||||
"id": "CVE-2021-40506",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-18T12:15:07.150",
|
||||
"lastModified": "2023-04-18T12:56:40.313",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T15:41:16.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the ALU unit of the OR1200 (aka OpenRISC 1200) processor 2011-09-10 through 2015-11-11. The overflow flag is not being updated for the msb and mac instructions, which results in an incorrect value in the overflow flag. Any software that relies on this flag may experience corruption in execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openrisc:or1200_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2011-09-10",
|
||||
"versionEndIncluding": "2015-11-11",
|
||||
"matchCriteriaId": "A483ADB7-281E-4BFE-91A7-2F3FA5415A9E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:openrisc:or1200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62C84E8E-52D8-43A5-9303-BAB92EBE2445"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openrisc/or1200/commit/2c0765d7ba12813df273cd693a99c4e744f0fbd5",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://seth.engr.tamu.edu/software-releases/thehuzz/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,95 @@
|
||||
"id": "CVE-2021-40507",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-18T12:15:07.307",
|
||||
"lastModified": "2023-04-18T12:56:40.313",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T15:41:19.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the ALU unit of the OR1200 (aka OpenRISC 1200) processor 2011-09-10 through 2015-11-11. The overflow flag is not being updated correctly for the subtract instruction, which results in an incorrect value in the overflow flag. Any software that relies on this flag may experience corruption in execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openrisc:or1200_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2011-09-10",
|
||||
"versionEndIncluding": "2015-11-11",
|
||||
"matchCriteriaId": "A483ADB7-281E-4BFE-91A7-2F3FA5415A9E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:openrisc:or1200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62C84E8E-52D8-43A5-9303-BAB92EBE2445"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openrisc/or1200/commit/2c0765d7ba12813df273cd693a99c4e744f0fbd5",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://seth.engr.tamu.edu/software-releases/thehuzz/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-0812",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-08-29T15:15:09.863",
|
||||
"lastModified": "2022-09-06T14:39:06.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:09.357",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +136,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0011/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://ubuntu.com/security/CVE-2022-0812",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-37434",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-08-05T07:15:07.240",
|
||||
"lastModified": "2023-01-09T16:44:23.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:09.470",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -321,6 +321,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/37",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/38",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/41",
|
||||
"source": "cve@mitre.org",
|
||||
@ -329,6 +337,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Oct/42",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/08/05/2",
|
||||
"source": "cve@mitre.org",
|
||||
@ -396,44 +408,24 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220901-0005/",
|
||||
@ -442,6 +434,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213488",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-41862",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-03T16:15:09.497",
|
||||
"lastModified": "2023-03-14T15:17:18.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:09.667",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -150,6 +150,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0002/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.postgresql.org/support/security/CVE-2022-41862/",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43548",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2022-12-05T22:15:10.923",
|
||||
"lastModified": "2023-03-01T16:36:55.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:09.797",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5326",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43551",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2022-12-23T15:15:15.777",
|
||||
"lastModified": "2023-01-10T15:44:46.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:09.903",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -106,6 +106,10 @@
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,75 @@
|
||||
"id": "CVE-2022-46640",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-18T13:15:09.193",
|
||||
"lastModified": "2023-04-18T17:36:19.570",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T15:54:56.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nanoleaf Desktop App before v1.3.1 was discovered to contain a command injection vulnerability which is exploited via a crafted HTTP request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nanoleaf:nanoleaf_desktop:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.3.1",
|
||||
"matchCriteriaId": "6D0AAE5F-9B73-487F-B355-E6D0C9852FBE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://nanoleaf.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-0215",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-02-08T20:15:24.107",
|
||||
"lastModified": "2023-02-24T15:15:12.150",
|
||||
"lastModified": "2023-04-27T15:15:09.993",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected."
|
||||
"value": "The public API function BIO_new_NDEF is a helper function used for streaming\nASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the\nSMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by\nend user applications.\n\nThe function receives a BIO from the caller, prepends a new BIO_f_asn1 filter\nBIO onto the front of it to form a BIO chain, and then returns the new head of\nthe BIO chain to the caller. Under certain conditions, for example if a CMS\nrecipient public key is invalid, the new filter BIO is freed and the function\nreturns a NULL result indicating a failure. However, in this case, the BIO chain\nis not properly cleaned up and the BIO passed by the caller still retains\ninternal pointers to the previously freed filter BIO. If the caller then goes on\nto call BIO_pop() on the BIO then a use-after-free will occur. This will most\nlikely result in a crash.\n\n\n\nThis scenario occurs directly in the internal function B64_write_ASN1() which\nmay cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on\nthe BIO. This internal function is in turn called by the public API functions\nPEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream,\nSMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.\n\nOther public API functions that may be impacted by this include\ni2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and\ni2d_PKCS7_bio_stream.\n\nThe OpenSSL cms and smime command line applications are similarly affected.\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -92,6 +92,14 @@
|
||||
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c3829dd8825c654652201e16f8a0a0c46ee3f344",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0009/",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssl.org/news/secadv/20230207.txt",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0482",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-02-17T22:15:11.957",
|
||||
"lastModified": "2023-03-01T13:44:34.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:10.077",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -81,6 +81,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0001/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1281",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2023-03-22T14:15:16.090",
|
||||
"lastModified": "2023-04-12T03:15:07.413",
|
||||
"lastModified": "2023-04-27T15:15:10.157",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -153,6 +153,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0004/",
|
||||
"source": "cve-coordination@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21911",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:12.583",
|
||||
"lastModified": "2023-04-19T19:12:56.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:10.263",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21912",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:12.660",
|
||||
"lastModified": "2023-04-19T18:45:18.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:10.400",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,6 +73,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21913",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:12.727",
|
||||
"lastModified": "2023-04-19T20:33:34.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:10.487",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21917",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:12.947",
|
||||
"lastModified": "2023-04-19T20:29:33.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:10.560",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21919",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:13.090",
|
||||
"lastModified": "2023-04-20T12:43:59.780",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:10.633",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21920",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:13.160",
|
||||
"lastModified": "2023-04-20T12:50:50.930",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:10.703",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21929",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:13.813",
|
||||
"lastModified": "2023-04-20T13:56:19.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:10.773",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21930",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:13.883",
|
||||
"lastModified": "2023-04-20T14:05:04.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:10.847",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -114,6 +114,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21933",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:14.110",
|
||||
"lastModified": "2023-04-19T14:32:14.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:10.917",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21935",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:14.277",
|
||||
"lastModified": "2023-04-19T14:33:08.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:10.987",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21937",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:14.507",
|
||||
"lastModified": "2023-04-19T15:40:12.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.067",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -114,6 +114,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21938",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:14.603",
|
||||
"lastModified": "2023-04-19T17:38:51.457",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.140",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -114,6 +114,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21939",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:14.690",
|
||||
"lastModified": "2023-04-19T17:41:23.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.210",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -114,6 +114,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21940",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:14.787",
|
||||
"lastModified": "2023-04-19T14:33:57.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.280",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21945",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:15.147",
|
||||
"lastModified": "2023-04-19T14:28:02.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.350",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21946",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:15.230",
|
||||
"lastModified": "2023-04-19T14:28:14.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.423",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21947",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:15.310",
|
||||
"lastModified": "2023-04-19T14:28:26.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.500",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21953",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:15.557",
|
||||
"lastModified": "2023-04-19T14:29:12.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.570",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21954",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:15.630",
|
||||
"lastModified": "2023-04-19T14:35:14.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.647",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -104,6 +104,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21955",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:15.710",
|
||||
"lastModified": "2023-04-19T14:29:25.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.717",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21962",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:16.017",
|
||||
"lastModified": "2023-04-19T14:30:13.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.790",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21963",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:16.090",
|
||||
"lastModified": "2023-04-19T14:30:25.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.860",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,6 +73,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21966",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:16.320",
|
||||
"lastModified": "2023-04-19T14:31:13.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.927",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21967",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:16.397",
|
||||
"lastModified": "2023-04-19T17:43:37.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:11.997",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -114,6 +114,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21968",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:16.470",
|
||||
"lastModified": "2023-04-19T17:55:47.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:12.067",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -114,6 +114,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21971",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:16.700",
|
||||
"lastModified": "2023-04-19T14:31:31.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:12.133",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0010/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21972",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:16.783",
|
||||
"lastModified": "2023-04-20T13:52:45.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:12.207",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21976",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:16.943",
|
||||
"lastModified": "2023-04-19T20:53:52.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:12.270",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21977",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:17.010",
|
||||
"lastModified": "2023-04-19T18:11:05.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:12.337",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,6 +65,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21980",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:17.227",
|
||||
"lastModified": "2023-04-20T15:23:18.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:12.407",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -13,7 +13,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -33,7 +33,7 @@
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "secalert_us@oracle.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -93,6 +93,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21982",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:17.367",
|
||||
"lastModified": "2023-04-19T20:54:46.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:12.503",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -66,6 +66,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2150",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-18T13:15:09.393",
|
||||
"lastModified": "2023-04-18T17:36:19.570",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T14:48:37.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
@ -71,18 +93,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:task_reminder_system_project:task_reminder_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD2D793D-38A9-47EE-A7AE-7DAE3441BBB0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.226271",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.226271",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://youtu.be/o46oHLvY2-E",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2151",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-18T13:15:09.467",
|
||||
"lastModified": "2023-04-18T17:36:19.570",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T14:54:32.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
@ -61,7 +83,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -69,20 +91,58 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:student_study_center_desk_management_system_project:student_study_center_desk_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A7F67EA-5AEE-4BE7-8EB3-F5C2FFDC5344"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xzz0787/vul/blob/main/README.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.226272",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.226272",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2340",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-04-27T13:15:09.213",
|
||||
"lastModified": "2023-04-27T13:15:09.213",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-27T14:36:08.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2023/CVE-2023-23xx/CVE-2023-2341.json
Normal file
59
CVE-2023/CVE-2023-23xx/CVE-2023-2341.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-2341",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-04-27T14:15:09.083",
|
||||
"lastModified": "2023-04-27T14:36:08.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.21."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/commit/66f1089fb1b9bcd575bfce9b1d4abb0f0499df11",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/cf3901ac-a649-478f-ab08-094ef759c11d",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-23xx/CVE-2023-2342.json
Normal file
59
CVE-2023/CVE-2023-23xx/CVE-2023-2342.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-2342",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-04-27T14:15:09.137",
|
||||
"lastModified": "2023-04-27T14:36:08.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/commit/42a5bbe5f16b97371fdbfdcf2bb3ee759dea8564",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/01cd3ed5-dce8-4021-9de0-81cb14bf1829",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-23xx/CVE-2023-2343.json
Normal file
59
CVE-2023/CVE-2023-23xx/CVE-2023-2343.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-2343",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-04-27T14:15:09.187",
|
||||
"lastModified": "2023-04-27T14:36:08.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site Scripting (XSS) - DOM in GitHub repository pimcore/pimcore prior to 10.5.21."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.1,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/commit/f1d904094700b513c4756904fa2b1e19d08d890e",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/2fa17227-a717-4b66-ab5a-16bffbb4edb2",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2344.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2344.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2344",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-27T14:15:09.240",
|
||||
"lastModified": "2023-04-27T14:36:08.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in SourceCodester Service Provider Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=save_service of the component HTTP POST Request Handler. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227587."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://cdn.polowong.top/image-20230427193041378.png",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227587",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227587",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
84
CVE-2023/CVE-2023-23xx/CVE-2023-2345.json
Normal file
84
CVE-2023/CVE-2023-23xx/CVE-2023-2345.json
Normal file
@ -0,0 +1,84 @@
|
||||
{
|
||||
"id": "CVE-2023-2345",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-27T15:15:13.187",
|
||||
"lastModified": "2023-04-27T15:58:36.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Service Provider Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php?f=delete_inquiry. The manipulation leads to improper authorization. The attack may be launched remotely. The identifier of this vulnerability is VDB-227588."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227588",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227588",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2346.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2346.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2346",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-27T15:15:13.400",
|
||||
"lastModified": "2023-04-27T15:58:36.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/inquiries/view_inquiry.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227589 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%201.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227589",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227589",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2347.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2347.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2347",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-27T15:15:13.617",
|
||||
"lastModified": "2023-04-27T15:58:36.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/services/manage_service.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227590 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%202.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227590",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227590",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2348.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2348.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2348",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-27T15:15:13.723",
|
||||
"lastModified": "2023-04-27T15:58:36.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227591."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%203.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227591",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227591",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-249xx/CVE-2023-24966.json
Normal file
59
CVE-2023/CVE-2023-249xx/CVE-2023-24966.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-24966",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-04-27T14:15:09.013",
|
||||
"lastModified": "2023-04-27T14:36:08.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 246904."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/246904",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/6986333",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25504",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-04-17T17:15:07.353",
|
||||
"lastModified": "2023-04-18T03:15:07.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T14:08:39.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
@ -36,7 +56,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -44,16 +64,51 @@
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.0.1",
|
||||
"matchCriteriaId": "20E98F0D-B484-4FA4-8273-074A75ED3227"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/04/18/8",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/tdnzkocfsqg2sbbornnp9g492fn4zhtx",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27475",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-03-07T18:15:09.170",
|
||||
"lastModified": "2023-03-15T14:23:16.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:12.573",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -98,6 +98,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0003/",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,81 @@
|
||||
"id": "CVE-2023-27705",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-17T15:15:07.053",
|
||||
"lastModified": "2023-04-17T17:33:32.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T14:27:37.573",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "APNG_Optimizer v1.4 was discovered to contain a buffer overflow via the component /apngopt/ubuntu.png."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apng_optimizer_project:apng_optimizer:1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8DFFB0BA-1345-4278-B57D-525E05ED2772"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bitbucket.org/tiangeng_zq/cve/src/main/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/projects/apng/files/APNG_Optimizer/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28466",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-16T00:15:11.563",
|
||||
"lastModified": "2023-03-21T17:27:19.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:12.730",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0006/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28772",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-23T15:15:12.177",
|
||||
"lastModified": "2023-03-27T15:47:13.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-04-27T15:15:12.957",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -94,6 +94,10 @@
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0005/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29255",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-04-27T13:15:09.053",
|
||||
"lastModified": "2023-04-27T13:15:09.053",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-27T14:36:08.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2023/CVE-2023-303xx/CVE-2023-30338.json
Normal file
20
CVE-2023/CVE-2023-303xx/CVE-2023-30338.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-30338",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-27T15:15:13.787",
|
||||
"lastModified": "2023-04-27T15:58:36.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Emlog Pro v2.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Article Title or Article Summary parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/emlog/emlog/issues/229",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-303xx/CVE-2023-30349.json
Normal file
20
CVE-2023/CVE-2023-303xx/CVE-2023-30349.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-30349",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-27T14:15:09.320",
|
||||
"lastModified": "2023-04-27T14:36:08.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "JFinal CMS v5.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the ActionEnter function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jflyfox/jfinal_cms/issues/54",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30444",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-04-27T13:15:09.290",
|
||||
"lastModified": "2023-04-27T13:15:09.290",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-27T14:36:08.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
63
CVE-2023/CVE-2023-308xx/CVE-2023-30847.json
Normal file
63
CVE-2023/CVE-2023-308xx/CVE-2023-30847.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-30847",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-27T15:15:13.833",
|
||||
"lastModified": "2023-04-27T15:58:36.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "H2O is an HTTP server. In versions 2.3.0-beta2 and prior, when the reverse proxy handler tries to processes a certain type of invalid HTTP request, it tries to build an upstream URL by reading from uninitialized pointer. This behavior can lead to crashes or leak of information to back end HTTP servers. Pull request number 3229 fixes the issue. The pull request has been merged to the `master` branch in commit f010336. Users should upgrade to commit f010336 or later."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h2o/h2o/commit/f010336bab162839df43d9e87570897466c97e33",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/h2o/h2o/pull/3229",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/h2o/h2o/security/advisories/GHSA-p5hj-phwj-hrvx",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
84
README.md
84
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-04-27T14:00:21.230695+00:00
|
||||
2023-04-27T16:00:23.761077+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-04-27T13:23:36.267000+00:00
|
||||
2023-04-27T15:58:36.043000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,23 +29,89 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
213666
|
||||
213678
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
* CVE-2023-2340 (`2023-04-27T13:15:09.213`)
|
||||
* CVE-2023-29255 (`2023-04-27T13:15:09.053`)
|
||||
* CVE-2023-30444 (`2023-04-27T13:15:09.290`)
|
||||
* [CVE-2023-2341](CVE-2023/CVE-2023-23xx/CVE-2023-2341.json) (`2023-04-27T14:15:09.083`)
|
||||
* [CVE-2023-2342](CVE-2023/CVE-2023-23xx/CVE-2023-2342.json) (`2023-04-27T14:15:09.137`)
|
||||
* [CVE-2023-2343](CVE-2023/CVE-2023-23xx/CVE-2023-2343.json) (`2023-04-27T14:15:09.187`)
|
||||
* [CVE-2023-2344](CVE-2023/CVE-2023-23xx/CVE-2023-2344.json) (`2023-04-27T14:15:09.240`)
|
||||
* [CVE-2023-2345](CVE-2023/CVE-2023-23xx/CVE-2023-2345.json) (`2023-04-27T15:15:13.187`)
|
||||
* [CVE-2023-2346](CVE-2023/CVE-2023-23xx/CVE-2023-2346.json) (`2023-04-27T15:15:13.400`)
|
||||
* [CVE-2023-2347](CVE-2023/CVE-2023-23xx/CVE-2023-2347.json) (`2023-04-27T15:15:13.617`)
|
||||
* [CVE-2023-2348](CVE-2023/CVE-2023-23xx/CVE-2023-2348.json) (`2023-04-27T15:15:13.723`)
|
||||
* [CVE-2023-24966](CVE-2023/CVE-2023-249xx/CVE-2023-24966.json) (`2023-04-27T14:15:09.013`)
|
||||
* [CVE-2023-30338](CVE-2023/CVE-2023-303xx/CVE-2023-30338.json) (`2023-04-27T15:15:13.787`)
|
||||
* [CVE-2023-30349](CVE-2023/CVE-2023-303xx/CVE-2023-30349.json) (`2023-04-27T14:15:09.320`)
|
||||
* [CVE-2023-30847](CVE-2023/CVE-2023-308xx/CVE-2023-30847.json) (`2023-04-27T15:15:13.833`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `58`
|
||||
|
||||
* CVE-2023-30542 (`2023-04-27T13:23:36.267`)
|
||||
* [CVE-2019-13263](CVE-2019/CVE-2019-132xx/CVE-2019-13263.json) (`2023-04-27T14:29:10.147`)
|
||||
* [CVE-2019-13264](CVE-2019/CVE-2019-132xx/CVE-2019-13264.json) (`2023-04-27T14:29:21.177`)
|
||||
* [CVE-2019-13265](CVE-2019/CVE-2019-132xx/CVE-2019-13265.json) (`2023-04-27T14:30:15.520`)
|
||||
* [CVE-2019-9122](CVE-2019/CVE-2019-91xx/CVE-2019-9122.json) (`2023-04-27T14:30:48.700`)
|
||||
* [CVE-2020-29557](CVE-2020/CVE-2020-295xx/CVE-2020-29557.json) (`2023-04-27T14:31:11.407`)
|
||||
* [CVE-2021-39537](CVE-2021/CVE-2021-395xx/CVE-2021-39537.json) (`2023-04-27T15:15:09.233`)
|
||||
* [CVE-2021-40506](CVE-2021/CVE-2021-405xx/CVE-2021-40506.json) (`2023-04-27T15:41:16.207`)
|
||||
* [CVE-2021-40507](CVE-2021/CVE-2021-405xx/CVE-2021-40507.json) (`2023-04-27T15:41:19.827`)
|
||||
* [CVE-2022-0812](CVE-2022/CVE-2022-08xx/CVE-2022-0812.json) (`2023-04-27T15:15:09.357`)
|
||||
* [CVE-2022-37434](CVE-2022/CVE-2022-374xx/CVE-2022-37434.json) (`2023-04-27T15:15:09.470`)
|
||||
* [CVE-2022-41862](CVE-2022/CVE-2022-418xx/CVE-2022-41862.json) (`2023-04-27T15:15:09.667`)
|
||||
* [CVE-2022-43548](CVE-2022/CVE-2022-435xx/CVE-2022-43548.json) (`2023-04-27T15:15:09.797`)
|
||||
* [CVE-2022-43551](CVE-2022/CVE-2022-435xx/CVE-2022-43551.json) (`2023-04-27T15:15:09.903`)
|
||||
* [CVE-2022-46640](CVE-2022/CVE-2022-466xx/CVE-2022-46640.json) (`2023-04-27T15:54:56.623`)
|
||||
* [CVE-2023-0215](CVE-2023/CVE-2023-02xx/CVE-2023-0215.json) (`2023-04-27T15:15:09.993`)
|
||||
* [CVE-2023-0482](CVE-2023/CVE-2023-04xx/CVE-2023-0482.json) (`2023-04-27T15:15:10.077`)
|
||||
* [CVE-2023-1281](CVE-2023/CVE-2023-12xx/CVE-2023-1281.json) (`2023-04-27T15:15:10.157`)
|
||||
* [CVE-2023-2150](CVE-2023/CVE-2023-21xx/CVE-2023-2150.json) (`2023-04-27T14:48:37.427`)
|
||||
* [CVE-2023-2151](CVE-2023/CVE-2023-21xx/CVE-2023-2151.json) (`2023-04-27T14:54:32.557`)
|
||||
* [CVE-2023-21911](CVE-2023/CVE-2023-219xx/CVE-2023-21911.json) (`2023-04-27T15:15:10.263`)
|
||||
* [CVE-2023-21912](CVE-2023/CVE-2023-219xx/CVE-2023-21912.json) (`2023-04-27T15:15:10.400`)
|
||||
* [CVE-2023-21913](CVE-2023/CVE-2023-219xx/CVE-2023-21913.json) (`2023-04-27T15:15:10.487`)
|
||||
* [CVE-2023-21917](CVE-2023/CVE-2023-219xx/CVE-2023-21917.json) (`2023-04-27T15:15:10.560`)
|
||||
* [CVE-2023-21919](CVE-2023/CVE-2023-219xx/CVE-2023-21919.json) (`2023-04-27T15:15:10.633`)
|
||||
* [CVE-2023-21920](CVE-2023/CVE-2023-219xx/CVE-2023-21920.json) (`2023-04-27T15:15:10.703`)
|
||||
* [CVE-2023-21929](CVE-2023/CVE-2023-219xx/CVE-2023-21929.json) (`2023-04-27T15:15:10.773`)
|
||||
* [CVE-2023-21930](CVE-2023/CVE-2023-219xx/CVE-2023-21930.json) (`2023-04-27T15:15:10.847`)
|
||||
* [CVE-2023-21933](CVE-2023/CVE-2023-219xx/CVE-2023-21933.json) (`2023-04-27T15:15:10.917`)
|
||||
* [CVE-2023-21935](CVE-2023/CVE-2023-219xx/CVE-2023-21935.json) (`2023-04-27T15:15:10.987`)
|
||||
* [CVE-2023-21937](CVE-2023/CVE-2023-219xx/CVE-2023-21937.json) (`2023-04-27T15:15:11.067`)
|
||||
* [CVE-2023-21938](CVE-2023/CVE-2023-219xx/CVE-2023-21938.json) (`2023-04-27T15:15:11.140`)
|
||||
* [CVE-2023-21939](CVE-2023/CVE-2023-219xx/CVE-2023-21939.json) (`2023-04-27T15:15:11.210`)
|
||||
* [CVE-2023-21940](CVE-2023/CVE-2023-219xx/CVE-2023-21940.json) (`2023-04-27T15:15:11.280`)
|
||||
* [CVE-2023-21945](CVE-2023/CVE-2023-219xx/CVE-2023-21945.json) (`2023-04-27T15:15:11.350`)
|
||||
* [CVE-2023-21946](CVE-2023/CVE-2023-219xx/CVE-2023-21946.json) (`2023-04-27T15:15:11.423`)
|
||||
* [CVE-2023-21947](CVE-2023/CVE-2023-219xx/CVE-2023-21947.json) (`2023-04-27T15:15:11.500`)
|
||||
* [CVE-2023-21953](CVE-2023/CVE-2023-219xx/CVE-2023-21953.json) (`2023-04-27T15:15:11.570`)
|
||||
* [CVE-2023-21954](CVE-2023/CVE-2023-219xx/CVE-2023-21954.json) (`2023-04-27T15:15:11.647`)
|
||||
* [CVE-2023-21955](CVE-2023/CVE-2023-219xx/CVE-2023-21955.json) (`2023-04-27T15:15:11.717`)
|
||||
* [CVE-2023-21962](CVE-2023/CVE-2023-219xx/CVE-2023-21962.json) (`2023-04-27T15:15:11.790`)
|
||||
* [CVE-2023-21963](CVE-2023/CVE-2023-219xx/CVE-2023-21963.json) (`2023-04-27T15:15:11.860`)
|
||||
* [CVE-2023-21966](CVE-2023/CVE-2023-219xx/CVE-2023-21966.json) (`2023-04-27T15:15:11.927`)
|
||||
* [CVE-2023-21967](CVE-2023/CVE-2023-219xx/CVE-2023-21967.json) (`2023-04-27T15:15:11.997`)
|
||||
* [CVE-2023-21968](CVE-2023/CVE-2023-219xx/CVE-2023-21968.json) (`2023-04-27T15:15:12.067`)
|
||||
* [CVE-2023-21971](CVE-2023/CVE-2023-219xx/CVE-2023-21971.json) (`2023-04-27T15:15:12.133`)
|
||||
* [CVE-2023-21972](CVE-2023/CVE-2023-219xx/CVE-2023-21972.json) (`2023-04-27T15:15:12.207`)
|
||||
* [CVE-2023-21976](CVE-2023/CVE-2023-219xx/CVE-2023-21976.json) (`2023-04-27T15:15:12.270`)
|
||||
* [CVE-2023-21977](CVE-2023/CVE-2023-219xx/CVE-2023-21977.json) (`2023-04-27T15:15:12.337`)
|
||||
* [CVE-2023-21980](CVE-2023/CVE-2023-219xx/CVE-2023-21980.json) (`2023-04-27T15:15:12.407`)
|
||||
* [CVE-2023-21982](CVE-2023/CVE-2023-219xx/CVE-2023-21982.json) (`2023-04-27T15:15:12.503`)
|
||||
* [CVE-2023-2340](CVE-2023/CVE-2023-23xx/CVE-2023-2340.json) (`2023-04-27T14:36:08.643`)
|
||||
* [CVE-2023-25504](CVE-2023/CVE-2023-255xx/CVE-2023-25504.json) (`2023-04-27T14:08:39.777`)
|
||||
* [CVE-2023-27475](CVE-2023/CVE-2023-274xx/CVE-2023-27475.json) (`2023-04-27T15:15:12.573`)
|
||||
* [CVE-2023-27705](CVE-2023/CVE-2023-277xx/CVE-2023-27705.json) (`2023-04-27T14:27:37.573`)
|
||||
* [CVE-2023-28466](CVE-2023/CVE-2023-284xx/CVE-2023-28466.json) (`2023-04-27T15:15:12.730`)
|
||||
* [CVE-2023-28772](CVE-2023/CVE-2023-287xx/CVE-2023-28772.json) (`2023-04-27T15:15:12.957`)
|
||||
* [CVE-2023-29255](CVE-2023/CVE-2023-292xx/CVE-2023-29255.json) (`2023-04-27T14:36:08.643`)
|
||||
* [CVE-2023-30444](CVE-2023/CVE-2023-304xx/CVE-2023-30444.json) (`2023-04-27T14:36:08.643`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user