From ece888757832f75d44843a3384aed4efbd611271 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ren=C3=A9=20Helmke?= Date: Wed, 3 May 2023 20:00:27 +0200 Subject: [PATCH] Auto-Update: 2023-05-03T18:00:24.489755+00:00 --- CVE-2012/CVE-2012-100xx/CVE-2012-10013.json | 64 +- CVE-2012/CVE-2012-100xx/CVE-2012-10014.json | 64 +- CVE-2022/CVE-2022-242xx/CVE-2022-24249.json | 9 +- CVE-2022/CVE-2022-271xx/CVE-2022-27145.json | 7 +- CVE-2022/CVE-2022-296xx/CVE-2022-29609.json | 70 +- CVE-2022/CVE-2022-299xx/CVE-2022-29944.json | 70 +- CVE-2023/CVE-2023-229xx/CVE-2023-22918.json | 1489 ++++++++++++++++++- CVE-2023/CVE-2023-22xx/CVE-2023-2251.json | 56 +- CVE-2023/CVE-2023-238xx/CVE-2023-23830.json | 55 + CVE-2023/CVE-2023-238xx/CVE-2023-23875.json | 55 + CVE-2023/CVE-2023-238xx/CVE-2023-23881.json | 55 + CVE-2023/CVE-2023-23xx/CVE-2023-2307.json | 107 ++ CVE-2023/CVE-2023-23xx/CVE-2023-2345.json | 57 +- CVE-2023/CVE-2023-23xx/CVE-2023-2346.json | 62 +- CVE-2023/CVE-2023-23xx/CVE-2023-2347.json | 62 +- CVE-2023/CVE-2023-23xx/CVE-2023-2348.json | 62 +- CVE-2023/CVE-2023-248xx/CVE-2023-24819.json | 69 +- CVE-2023/CVE-2023-248xx/CVE-2023-24820.json | 73 +- CVE-2023/CVE-2023-259xx/CVE-2023-25967.json | 55 + CVE-2023/CVE-2023-260xx/CVE-2023-26017.json | 55 + CVE-2023/CVE-2023-260xx/CVE-2023-26059.json | 63 +- CVE-2023/CVE-2023-269xx/CVE-2023-26930.json | 82 + CVE-2023/CVE-2023-269xx/CVE-2023-26931.json | 82 + CVE-2023/CVE-2023-269xx/CVE-2023-26934.json | 82 + CVE-2023/CVE-2023-269xx/CVE-2023-26935.json | 82 + CVE-2023/CVE-2023-269xx/CVE-2023-26936.json | 82 + CVE-2023/CVE-2023-269xx/CVE-2023-26937.json | 82 + CVE-2023/CVE-2023-269xx/CVE-2023-26938.json | 82 + CVE-2023/CVE-2023-294xx/CVE-2023-29479.json | 71 +- CVE-2023/CVE-2023-294xx/CVE-2023-29480.json | 64 +- CVE-2023/CVE-2023-302xx/CVE-2023-30210.json | 76 + CVE-2023/CVE-2023-302xx/CVE-2023-30211.json | 76 + CVE-2023/CVE-2023-302xx/CVE-2023-30212.json | 76 + CVE-2023/CVE-2023-303xx/CVE-2023-30338.json | 66 +- CVE-2023/CVE-2023-306xx/CVE-2023-30613.json | 57 +- README.md | 143 +- 36 files changed, 3672 insertions(+), 190 deletions(-) create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23830.json create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23875.json create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23881.json create mode 100644 CVE-2023/CVE-2023-23xx/CVE-2023-2307.json create mode 100644 CVE-2023/CVE-2023-259xx/CVE-2023-25967.json create mode 100644 CVE-2023/CVE-2023-260xx/CVE-2023-26017.json create mode 100644 CVE-2023/CVE-2023-269xx/CVE-2023-26930.json create mode 100644 CVE-2023/CVE-2023-269xx/CVE-2023-26931.json create mode 100644 CVE-2023/CVE-2023-269xx/CVE-2023-26934.json create mode 100644 CVE-2023/CVE-2023-269xx/CVE-2023-26935.json create mode 100644 CVE-2023/CVE-2023-269xx/CVE-2023-26936.json create mode 100644 CVE-2023/CVE-2023-269xx/CVE-2023-26937.json create mode 100644 CVE-2023/CVE-2023-269xx/CVE-2023-26938.json create mode 100644 CVE-2023/CVE-2023-302xx/CVE-2023-30210.json create mode 100644 CVE-2023/CVE-2023-302xx/CVE-2023-30211.json create mode 100644 CVE-2023/CVE-2023-302xx/CVE-2023-30212.json diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10013.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10013.json index e753221f3b3..e57822eeb59 100644 --- a/CVE-2012/CVE-2012-100xx/CVE-2012-10013.json +++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10013.json @@ -2,8 +2,8 @@ "id": "CVE-2012-10013", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-24T18:15:08.783", - "lastModified": "2023-04-25T12:52:57.877", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T17:03:26.333", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,22 +93,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kau-boys:backend_localization:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0", + "matchCriteriaId": "9AB1A388-C6BF-4259-B500-DB4DB09F7F87" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wp-plugins/kau-boys-backend-localization/commit/43dc96defd7944da12ff116476a6890acd7dd24b", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/wp-plugins/kau-boys-backend-localization/releases/tag/2.0", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.227231", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.227231", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10014.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10014.json index 8ce311a0c5a..0d7d7c36e0b 100644 --- a/CVE-2012/CVE-2012-100xx/CVE-2012-10014.json +++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10014.json @@ -2,8 +2,8 @@ "id": "CVE-2012-10014", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-24T18:15:08.867", - "lastModified": "2023-04-25T12:52:57.877", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T17:00:58.130", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,22 +93,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kau-boys:backend_localization:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.1", + "matchCriteriaId": "FCCEF46F-09F8-40A1-8C19-1F4D1CB92DDC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wp-plugins/kau-boys-backend-localization/commit/36f457ee16dd114e510fd91a3ea9fbb3c1f87184", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/wp-plugins/kau-boys-backend-localization/releases/tag/2.0.1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.227232", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.227232", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-242xx/CVE-2022-24249.json b/CVE-2022/CVE-2022-242xx/CVE-2022-24249.json index c27ba31fb0d..8d710b3d0b6 100644 --- a/CVE-2022/CVE-2022-242xx/CVE-2022-24249.json +++ b/CVE-2022/CVE-2022-242xx/CVE-2022-24249.json @@ -2,7 +2,7 @@ "id": "CVE-2022-24249", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-04T19:15:08.100", - "lastModified": "2022-02-09T02:15:44.103", + "lastModified": "2023-05-03T16:48:21.923", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,8 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0.0", + "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E" } ] } @@ -98,6 +99,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Issue Tracking", + "Patch", "Third Party Advisory" ] } diff --git a/CVE-2022/CVE-2022-271xx/CVE-2022-27145.json b/CVE-2022/CVE-2022-271xx/CVE-2022-27145.json index 4e3549eff2c..2003b5393bf 100644 --- a/CVE-2022/CVE-2022-271xx/CVE-2022-27145.json +++ b/CVE-2022/CVE-2022-271xx/CVE-2022-27145.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27145", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-08T16:15:08.327", - "lastModified": "2022-04-14T19:35:19.553", + "lastModified": "2023-05-03T16:48:11.460", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,8 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:1.1.0-dev-rev1727-g8be34973d-master:*:*:*:*:*:*:*", - "matchCriteriaId": "C0BF5844-AE9D-4B56-86AB-B56713DAA015" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0.0", + "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E" } ] } diff --git a/CVE-2022/CVE-2022-296xx/CVE-2022-29609.json b/CVE-2022/CVE-2022-296xx/CVE-2022-29609.json index 079e1ea5b84..5f4bbfc524b 100644 --- a/CVE-2022/CVE-2022-296xx/CVE-2022-29609.json +++ b/CVE-2022/CVE-2022-296xx/CVE-2022-29609.json @@ -2,23 +2,83 @@ "id": "CVE-2022-29609", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-20T13:15:07.630", - "lastModified": "2023-04-20T13:15:13.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T17:55:53.000", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in ONOS 2.5.1. An intent with the same source and destination shows the INSTALLING state, indicating that its flow rules are installing. Improper handling of such an intent is misleading to a network operator." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opennetworking:onos:2.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5DD1D050-BBF8-45B6-9B4E-93FC5D062414" + } + ] + } + ] + } + ], "references": [ { "url": "https://wiki.onosproject.org/display/ONOS/Intent+Framework", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.usenix.org/system/files/sec23fall-prepub-285_kim-jiwon.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-299xx/CVE-2022-29944.json b/CVE-2022/CVE-2022-299xx/CVE-2022-29944.json index d9ac0bd8c75..467b6f48b81 100644 --- a/CVE-2022/CVE-2022-299xx/CVE-2022-29944.json +++ b/CVE-2022/CVE-2022-299xx/CVE-2022-29944.json @@ -2,23 +2,83 @@ "id": "CVE-2022-29944", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-20T13:15:07.677", - "lastModified": "2023-04-20T13:15:13.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T17:27:22.773", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in ONOS 2.5.1. There is an incorrect comparison of paths installed by intents. An existing intents does not redirect to a new path, even if a new intent that shares the path with higher priority is installed." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-697" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opennetworking:onos:2.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5DD1D050-BBF8-45B6-9B4E-93FC5D062414" + } + ] + } + ] + } + ], "references": [ { "url": "https://wiki.onosproject.org/display/ONOS/Intent+Framework", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.usenix.org/system/files/sec23fall-prepub-285_kim-jiwon.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22918.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22918.json index 82d573096bd..0ca2fa71981 100644 --- a/CVE-2023/CVE-2023-229xx/CVE-2023-22918.json +++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22918.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22918", "sourceIdentifier": "security@zyxel.com.tw", "published": "2023-04-24T18:15:09.027", - "lastModified": "2023-04-25T12:52:57.877", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T16:58:15.893", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security@zyxel.com.tw", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security@zyxel.com.tw", "type": "Secondary", @@ -46,10 +76,1463 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.32", + "versionEndExcluding": "5.36", + "matchCriteriaId": "84A41F09-4474-4ABC-B2FA-92B17F63A7CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D68A36FF-8CAF-401C-9F18-94F3A2405CF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.32", + "versionEndExcluding": "5.36", + "matchCriteriaId": "73E39B94-291E-4E3A-8A89-B74FF063BA05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F7654A1-3806-41C7-82D4-46B0CD7EE53B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.32", + "versionEndExcluding": "5.36", + "matchCriteriaId": "7728D2C4-0B0A-404E-92BC-AAA1A1987BFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B41F437-855B-4490-8011-DF59887BE6D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.32", + "versionEndExcluding": "5.36", + "matchCriteriaId": "8B7E5F75-5577-4511-A1F4-1BD142D60BD5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2818E8AC-FFEE-4DF9-BF3F-C75166C0E851" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.32", + "versionEndExcluding": "5.36", + "matchCriteriaId": "B8F79940-F737-4A71-9FAC-1F99E0BCE450" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47398FD0-6C5E-4625-9EFD-DE08C9AB7DB2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.32", + "versionEndExcluding": "5.36", + "matchCriteriaId": "791D6928-BE82-4678-A8A4-39C9D9A1C684" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66B99746-0589-46E6-9CBD-F38619AD97DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.50", + "versionEndExcluding": "5.36", + "matchCriteriaId": "FC95F84E-95A0-4FB8-942A-732E022E3CC6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B30A4C0-9928-46AD-9210-C25656FB43FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.50", + "versionEndExcluding": "5.36", + "matchCriteriaId": "07895A23-2B15-4631-A55A-798B35A63E2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646C1F07-B553-47B0-953B-DC7DE7FD0F8B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.50", + "versionEndExcluding": "5.36", + "matchCriteriaId": "F65ACDFE-3A54-46D6-98CA-2D51957072AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F93B6A06-2951-46D2-A7E1-103D7318D612" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.50", + "versionEndExcluding": "5.36", + "matchCriteriaId": "C0B8FF81-5020-429E-ABC7-D0F18A5177F5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92C697A5-D1D3-4FF0-9C43-D27B18181958" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.50", + "versionEndExcluding": "5.36", + "matchCriteriaId": "FD0F817C-6388-41E2-9F80-9B5427036865" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D1396E3-731B-4D05-A3F8-F3ABB80D5C29" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.50", + "versionEndExcluding": "5.36", + "matchCriteriaId": "7D65F0EC-7ACA-4B80-8D4E-2C1459837D15" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D74ABA7E-AA78-4A13-A64E-C44021591B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.16", + "versionEndExcluding": "5.36", + "matchCriteriaId": "224300FB-2462-4E88-A41E-E9E8EAE9CF48" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BEA412F-3DA1-4E91-9C74-0666147DABCE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.16", + "versionEndExcluding": "5.36", + "matchCriteriaId": "F61480ED-BBF0-49EC-A814-CEFDE1FBFA08" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "110A1CA4-0170-4834-8281-0A3E14FC5584" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:usg20-vpn_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.30", + "versionEndExcluding": "5.36", + "matchCriteriaId": "7079103C-ED92-40C3-AF42-4689822A96E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:usg20-vpn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7239C54F-EC9E-44B4-AE33-1D36E5448219" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.30", + "versionEndExcluding": "5.36", + "matchCriteriaId": "FB329984-D2A1-40B4-826D-78643B8DD4C8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81D90A7B-174F-40A1-8AF4-08B15B7BAC40" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.30", + "versionEndExcluding": "5.36", + "matchCriteriaId": "5DB62871-BC40-43D8-A486-471CD9316332" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EECD311A-4E96-4576-AADF-47291EDE3559" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.30", + "versionEndExcluding": "5.36", + "matchCriteriaId": "D0135FFF-62FA-4AEA-8B67-1CCA2D85D8E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C45C303-1A95-4245-B242-3AB9B9106CD4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.30", + "versionEndExcluding": "5.36", + "matchCriteriaId": "B01FA34A-CA33-48E7-978C-638FC678C9C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E3AC823-0ECA-42D8-8312-2FBE5914E4C0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nap203_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.28\\(abfa.0\\)", + "matchCriteriaId": "85AA4E30-0A0E-4353-B88D-A856B83162DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nap203:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80AE2CEA-90AC-421A-86BB-F404CDE7785D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nap303_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.28\\(abex.0\\)", + "matchCriteriaId": "36AD6F34-B17E-4853-9375-62B51DE5F1D2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nap303:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4BF5D4C-DB8E-4077-BE78-C73AA203406C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nap353_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.28\\(abey.0\\)", + "matchCriteriaId": "49E8EA12-187E-402B-866A-9125B2287292" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nap353:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BCEC13E-3D1C-4B42-87F5-94FE1066C218" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nwa110ax_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(abtg.2\\)", + "matchCriteriaId": "58E64F26-5465-4BD8-A948-39022B5AAA52" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nwa110ax:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A3F9232-F988-4428-9898-4F536123CE88" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nwa1123-ac_hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.25\\(abin.9\\)", + "matchCriteriaId": "E8DEEFBF-DD32-40E5-A431-BE6A93D529A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nwa1123-ac_hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A0FB576-76A2-4A25-979E-5E5B3BF5C636" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nwa1123-ac-pro_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.28\\(abhd.0\\)", + "matchCriteriaId": "3448A074-A9B8-40BD-8DFA-E7097E402750" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nwa1123-ac-pro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DC66B07-67FB-47F6-B54B-E40BE89F33A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nwa1123acv3_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(abvt.0\\)", + "matchCriteriaId": "BFC6F464-DAE9-42CE-9339-C5E35B90B17B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nwa1123acv3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36C13E7F-2186-4587-83E9-57B05A7147B7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nwa210ax_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(abtd.2\\)", + "matchCriteriaId": "DCE46E92-D9DD-439C-BD41-88738FA652B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nwa210ax:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB129F9-64D8-43C2-9366-51EBDF419F5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nwa220ax-6e_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(acco.2\\)", + "matchCriteriaId": "DECB1230-D22C-4FBD-909C-6315B66B189D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nwa220ax-6e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E03F755-424D-4248-9076-ED7BECEB94C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nwa50ax_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.55\\(acge.1\\)", + "matchCriteriaId": "0B73F329-98E5-496F-BE38-47DD023DCB64" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nwa50ax:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2806A3B3-8F13-4170-B284-8809E3502044" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nwa50ax-pro_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(acge.0\\)", + "matchCriteriaId": "B5804045-E32E-40E0-B42E-80755C385974" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nwa50ax-pro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7DD6E6B-61EC-4E60-8244-56ADB26F2234" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nwa5123-ac_hd_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.25\\(abim.9\\)", + "matchCriteriaId": "881C0001-B6CA-409D-8901-653227098219" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nwa5123-ac_hd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D85300F-9207-438C-A149-80FC7C6C0746" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nwa55axe_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.29\\(abzl.1\\)", + "matchCriteriaId": "4484EA94-3E1D-4DA8-B612-A35D50DC1103" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nwa55axe:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7440976-5CB4-40BE-95C2-98EF4B888109" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nwa90ax_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.29\\(accv.1\\)", + "matchCriteriaId": "3D091EB4-A1FC-4E5F-AEE2-6EF879DC5B0A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nwa90ax:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A903978-737E-4266-A670-BC94E32CAF96" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:nwa90ax-pro_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(acgf.0\\)", + "matchCriteriaId": "D4FF6556-2B10-4A8C-9325-0A6D4B41E529" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:nwa90ax-pro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFA44855-B135-44BD-AE21-FC58CD647AB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wac500_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(abvs.0\\)", + "matchCriteriaId": "4D277464-AF76-4799-9B71-E96CB12BE0C0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wac500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C024551-F08F-4152-940D-1CF8BCD79613" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wac500h_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(abwa.0\\)", + "matchCriteriaId": "57DFDE05-C95F-446B-BA97-98EBA11C9794" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wac500h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A1FD502-4F62-4C77-B3BC-E563B24F0067" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wac5302d-sv2_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.25\\(abvz.9\\)", + "matchCriteriaId": "84A8FBD7-8461-474E-AFB1-BCAE24D4A2CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wac5302d-sv2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A690501F-DC2D-4F90-ABC0-33B5F1279C36" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wac6103d-i_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.28\\(aaxh.0\\)", + "matchCriteriaId": "3DF539FD-EDEA-4D37-8F1C-267884A617EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wac6103d-i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "341DB051-7F01-4B36-BA15-EBC25FACB439" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wac6303d-s_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.25\\(abgl.9\\)", + "matchCriteriaId": "622C2163-0B2F-4A32-B5C4-4111B8EC9096" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wac6303d-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0F08117-0BCE-4EA1-8DA7-1AC4EFF67E2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wac6502d-e_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.28\\(aasd.0\\)", + "matchCriteriaId": "A929856C-58D2-41AB-9EAC-E655123FD4FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wac6502d-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD8842C8-FB0A-46F0-9BB4-CAC6334D1E51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wac6502d-s_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.28\\(aase.0\\)", + "matchCriteriaId": "AB36BF49-E31B-4F35-84B9-3EF20989FE2A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wac6502d-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD108388-ABE5-4142-910F-C3C8B1C13617" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wac6503d-s_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.28\\(aasf.0\\)", + "matchCriteriaId": "CCA23320-A0E2-4A63-A20A-1F5FD7504C5F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wac6503d-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DFDF64A-17F5-4F05-8700-DCA36CCB6F2B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wac6552d-s_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.28\\(abio.0\\)", + "matchCriteriaId": "E49B6FA1-4FCE-4802-8FCA-988048D9A595" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wac6552d-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD47738A-9001-4CC1-8FED-1D1CFC56F548" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wac6553d-e_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.28\\(aasg.0\\)", + "matchCriteriaId": "AD253268-2B7D-43BF-86BD-E603A52FD98A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wac6553d-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55273BCE-4F2C-4ED9-9FCB-D1197555BD53" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wax510d_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(abtf.2\\)", + "matchCriteriaId": "B0C89819-CCB6-42A0-8045-850D544D1BBA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wax510d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A37A0E9-D505-4376-AB0E-1C0FD7E53A55" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wax610d_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(abte.2\\)", + "matchCriteriaId": "EA21E78C-585A-4689-96B7-18C5DB44D2DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wax610d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3518DA0A-2C7B-4979-A457-0826C921B0F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wax620d-6e_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(accn.2\\)", + "matchCriteriaId": "6B470158-EE21-45EB-BDEC-5396DE9CB23C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wax620d-6e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B4EBCC9-4FF9-41FC-9FFE-DBFAB239888B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wax630s_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(abzd.2\\)", + "matchCriteriaId": "43DD5397-02A9-40DD-BD02-052095CB8DDB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wax630s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC74AAF9-5206-4CEB-9023-6CD4F38AA623" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wax640s-6e_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(accm.2\\)", + "matchCriteriaId": "F946BABC-A982-4625-AD9F-962C6FBDFDE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wax640s-6e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20E4E9A0-DF92-47B7-94D6-0867E3171E47" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wax650s_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(abrm.2\\)", + "matchCriteriaId": "2260165C-2483-4F48-8E70-DC82B5DA1554" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wax650s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D784994E-E2CE-4328-B490-D9DC195A53DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:wax655e_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.50\\(acdo.2\\)", + "matchCriteriaId": "F6B0AE56-107B-41E2-A06A-BC8DC0A32FE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:wax655e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61158220-B5E8-4BF4-B2C2-E8ABFD3266CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-of-firewalls-and-aps", - "source": "security@zyxel.com.tw" + "source": "security@zyxel.com.tw", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2251.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2251.json index 7213195519c..1059186c9f9 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2251.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2251.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2251", "sourceIdentifier": "security@huntr.dev", "published": "2023-04-24T15:15:08.897", - "lastModified": "2023-04-28T15:15:10.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T17:26:16.587", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -46,14 +68,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yaml_project:yaml:*:*:*:*:*:go:*:*", + "versionEndExcluding": "2.0.0-4", + "matchCriteriaId": "33E17CA5-8A74-4BE7-ACC1-CD1DBE0695BD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/eemeli/yaml/commit/984f5781ffd807e58cad3b5c8da1f940dab75fba", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.dev/bounties/4b494e99-5a3e-40d9-8678-277f3060e96c", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23830.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23830.json new file mode 100644 index 00000000000..3634920f3c9 --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23830.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23830", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-03T16:15:09.717", + "lastModified": "2023-05-03T16:15:09.717", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ProfilePress Membership Team ProfilePress plugin <=\u00a04.5.4 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-user-avatar/wordpress-profilepress-plugin-4-5-4-cross-site-scripting-xss-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23875.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23875.json new file mode 100644 index 00000000000..fbff0960f1b --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23875.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23875", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-03T16:15:10.130", + "lastModified": "2023-05-03T16:15:10.130", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Himanshu Bing Site Verification plugin using Meta Tag plugin <=\u00a01.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/bing-site-verification-using-meta-tag/wordpress-bing-site-verification-plugin-using-meta-tag-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23881.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23881.json new file mode 100644 index 00000000000..723f15193a8 --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23881.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23881", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-03T16:15:10.237", + "lastModified": "2023-05-03T16:15:10.237", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GreenTreeLabs Circles Gallery plugin <=\u00a01.0.10 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/circles-gallery/wordpress-circles-gallery-plugin-1-0-10-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2307.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2307.json new file mode 100644 index 00000000000..2bac6d0bf84 --- /dev/null +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2307.json @@ -0,0 +1,107 @@ +{ + "id": "CVE-2023-2307", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-04-26T17:15:11.217", + "lastModified": "2023-05-03T16:41:14.190", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) in GitHub repository builderio/qwik prior to 0.104.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:builder:qwik:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.104.0", + "matchCriteriaId": "1853709E-692C-4325-BEBD-D56495DED1C2" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://github.com/builderio/qwik/commit/09190b70027354baf7ad3d208df9c05a87f75f57", + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] + }, + { + "url": "https://huntr.dev/bounties/204ea12e-9e5c-4166-bf0e-fd49c8836917", + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2345.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2345.json index 8c37257dd94..8bef79b0c16 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2345.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2345.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2345", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-27T15:15:13.187", - "lastModified": "2023-04-27T15:58:36.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T16:59:03.360", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,14 +93,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.227588", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.227588", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2346.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2346.json index 9b6858880fe..825998bc07e 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2346.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2346.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2346", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-27T15:15:13.400", - "lastModified": "2023-04-27T15:58:36.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T16:58:35.860", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +93,48 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%201.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.227589", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.227589", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2347.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2347.json index 94924f75c55..d444d7708a2 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2347.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2347.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2347", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-27T15:15:13.617", - "lastModified": "2023-04-27T15:58:36.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T16:58:18.770", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +93,48 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%202.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.227590", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.227590", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2348.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2348.json index 28ff0428413..3db829a20ab 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2348.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2348.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2348", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-27T15:15:13.723", - "lastModified": "2023-04-27T15:58:36.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T16:57:42.023", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +93,48 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Service%20Provider%20Management%20System/Service%20Provider%20Management%20System%20-%20vuln%203.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.227591", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.227591", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24819.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24819.json index eb36dea9731..2b8f5ab9e21 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24819.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24819.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24819", "sourceIdentifier": "security-advisories@github.com", "published": "2023-04-24T15:15:07.907", - "lastModified": "2023-04-24T15:35:56.667", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T16:12:07.527", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,18 +80,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2022.10", + "matchCriteriaId": "2A1B64C3-901D-4D06-AD22-FA94E65D5024" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/RIOT-OS/RIOT/pull/18817/commits/73615161c01fcfbbc7216cf502cabb12c1598ee4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/RIOT-OS/RIOT/pull/18820/commits/da63e45ee94c03a2e08625b04ea618653eab4a9f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-fv97-2448-gcf6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24820.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24820.json index 08f00c213e4..7445d8cc2e6 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24820.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24820.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24820", "sourceIdentifier": "security-advisories@github.com", "published": "2023-04-24T15:15:07.987", - "lastModified": "2023-04-24T15:35:56.667", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T16:27:55.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,7 +56,7 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -48,20 +68,61 @@ "value": "CWE-787" } ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2022.10", + "matchCriteriaId": "2A1B64C3-901D-4D06-AD22-FA94E65D5024" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/RIOT-OS/RIOT/pull/18817/commits/2709fbd827b688fe62df2c77c316914f4a3a6d4a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/RIOT-OS/RIOT/pull/18820/commits/d052e2ee166e55bbdfe4c455e65dbd7e3479ebe3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-vpx8-h94p-9vrj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25967.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25967.json new file mode 100644 index 00000000000..f56f93bc7a1 --- /dev/null +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25967.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25967", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-03T16:15:10.480", + "lastModified": "2023-05-03T16:15:10.480", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in PeepSo Community by PeepSo plugin <=\u00a06.0.2.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/peepso-core/wordpress-community-by-peepso-social-network-membership-registration-user-profiles-plugin-6-0-2-0-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26017.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26017.json new file mode 100644 index 00000000000..d19c81ac452 --- /dev/null +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26017.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-26017", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-03T16:15:10.747", + "lastModified": "2023-05-03T16:15:10.747", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in BlueGlass Jobs for WordPress plugin <=\u00a02.5.10.2 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/job-postings/wordpress-jobs-for-wordpress-plugin-2-5-10-2-cross-site-scripting-xss?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26059.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26059.json index a4b0b928f65..8d7daefbb15 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26059.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26059.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26059", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-24T18:15:09.090", - "lastModified": "2023-04-25T12:52:57.877", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T16:06:54.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -34,14 +54,49 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nokia:netact:20.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4884872D-10EF-48EB-94EA-FAFD6B52D37D" + } + ] + } + ] + } + ], "references": [ { "url": "https://nokia.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2022-03/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26930.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26930.json new file mode 100644 index 00000000000..0cd5e3dcb4e --- /dev/null +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26930.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2023-26930", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-26T19:15:08.783", + "lastModified": "2023-05-03T16:49:07.453", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via the PDFDoc malloc in the pdftotext.cc function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", + "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34", + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/huanglei3/xpdf_aborted", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26931.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26931.json new file mode 100644 index 00000000000..859a3055805 --- /dev/null +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26931.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2023-26931", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-26T19:15:08.820", + "lastModified": "2023-05-03T16:48:11.660", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via the TextOutputDev.cc function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", + "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34", + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://note.youdao.com/s/7Nkhj01p", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26934.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26934.json new file mode 100644 index 00000000000..10ca42ba879 --- /dev/null +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26934.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2023-26934", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-26T19:15:08.857", + "lastModified": "2023-05-03T16:47:27.773", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "An issue found in XPDF v.4.04 allows an attacker to cause a denial of service via a crafted pdf file in the object.cc parameter." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", + "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34", + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/object_copy", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26935.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26935.json new file mode 100644 index 00000000000..8550df59cf9 --- /dev/null +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26935.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2023-26935", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-26T19:15:08.893", + "lastModified": "2023-05-03T16:46:40.757", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via SharedFile::readBlock at /xpdf/Stream.cc." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", + "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34", + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/huanglei3/xpdf_heapoverflow", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26936.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26936.json new file mode 100644 index 00000000000..76d8eef82bd --- /dev/null +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26936.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2023-26936", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-26T19:15:08.930", + "lastModified": "2023-05-03T16:46:25.367", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via gmalloc in gmem.cc" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", + "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34", + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/gmem_copyString", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26937.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26937.json new file mode 100644 index 00000000000..ac576c00306 --- /dev/null +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26937.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2023-26937", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-26T19:15:08.963", + "lastModified": "2023-05-03T16:45:53.083", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via GString::resize located in goo/GString.cc" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", + "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34", + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/Stack_backtracking_gstring", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26938.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26938.json new file mode 100644 index 00000000000..be599c7d797 --- /dev/null +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26938.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2023-26938", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-26T19:15:09.000", + "lastModified": "2023-05-03T16:45:10.690", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service viaSharedFile::readBlock located in goo/gfile.cc." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", + "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34", + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/huanglei3/xpdf_heapoverflow/edit/main/Stack_backtracking_readblock", + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29479.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29479.json index 42ded0d250f..7770eea4df0 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29479.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29479.json @@ -2,19 +2,82 @@ "id": "CVE-2023-29479", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-24T15:15:08.727", - "lastModified": "2023-04-24T15:35:56.667", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T16:56:35.370", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Ribose RNP before 0.16.3 may hang when the input is malformed." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ribose:rnp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.16.3", + "matchCriteriaId": "9BD9667E-867D-432E-B296-8B0C2CD1BD49" + } + ] + } + ] + } + ], "references": [ + { + "url": "https://cve.ribose.com/advisories/ra-2023-04-11/", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "https://www.rnpgp.org/blog/2023-04-13-rnp-release-0-16-3/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29480.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29480.json index 13ee3c6bb92..c0094389a3b 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29480.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29480.json @@ -2,19 +2,75 @@ "id": "CVE-2023-29480", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-24T15:15:08.770", - "lastModified": "2023-04-24T15:35:56.667", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T17:11:10.983", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Ribose RNP before 0.16.3 sometimes lets secret keys remain unlocked after use." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ribose:rnp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.16.3", + "matchCriteriaId": "9BD9667E-867D-432E-B296-8B0C2CD1BD49" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.rnpgp.org/blog/2023-04-13-rnp-release-0-16-3/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-302xx/CVE-2023-30210.json b/CVE-2023/CVE-2023-302xx/CVE-2023-30210.json new file mode 100644 index 00000000000..07b913cdf3f --- /dev/null +++ b/CVE-2023/CVE-2023-302xx/CVE-2023-30210.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2023-30210", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-26T16:15:10.023", + "lastModified": "2023-05-03T16:41:53.360", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "OURPHP <= 7.2.0 is vulnerable to Cross Site Scripting (XSS) via ourphp_tz.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ourphp:ourphp:*:*:*:*:*:*:*:*", + "versionEndIncluding": "7.2.0", + "matchCriteriaId": "D371179F-DCD6-406E-A2E2-F1D355D9EE5D" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://wanheiqiyihu.top/2023/03/27/OURPHP-v7-2-0-ourphp-tz-php-Reflection-xss/", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-302xx/CVE-2023-30211.json b/CVE-2023/CVE-2023-302xx/CVE-2023-30211.json new file mode 100644 index 00000000000..30fcadea207 --- /dev/null +++ b/CVE-2023/CVE-2023-302xx/CVE-2023-30211.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2023-30211", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-26T16:15:10.067", + "lastModified": "2023-05-03T16:41:39.160", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "OURPHP <= 7.2.0 is vulnerable to SQL Injection." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ourphp:ourphp:*:*:*:*:*:*:*:*", + "versionEndIncluding": "7.2.0", + "matchCriteriaId": "D371179F-DCD6-406E-A2E2-F1D355D9EE5D" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://wanheiqiyihu.top/2023/03/27/OURPHP-v7-2-0-Background-SQL-injection/", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-302xx/CVE-2023-30212.json b/CVE-2023/CVE-2023-302xx/CVE-2023-30212.json new file mode 100644 index 00000000000..2c9f5899072 --- /dev/null +++ b/CVE-2023/CVE-2023-302xx/CVE-2023-30212.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2023-30212", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-26T17:15:11.297", + "lastModified": "2023-05-03T16:38:41.690", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "OURPHP <= 7.2.0 is vulnerale to Cross Site Scripting (XSS) via /client/manage/ourphp_out.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ourphp:ourphp:*:*:*:*:*:*:*:*", + "versionEndIncluding": "7.2.0", + "matchCriteriaId": "D371179F-DCD6-406E-A2E2-F1D355D9EE5D" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://wanheiqiyihu.top/2023/03/27/OURPHP-v7-2-0-ourphp-out-php-Reflection-xss/", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30338.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30338.json index b4766380bd2..f808e9c6abf 100644 --- a/CVE-2023/CVE-2023-303xx/CVE-2023-30338.json +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30338.json @@ -2,19 +2,77 @@ "id": "CVE-2023-30338", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-27T15:15:13.787", - "lastModified": "2023-04-27T15:58:36.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T16:57:02.093", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Emlog Pro v2.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Article Title or Article Summary parameters." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emlog:emlog:2.0.3:*:*:*:pro:*:*:*", + "matchCriteriaId": "5B872763-766F-478B-BA9C-97A85DC372F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/emlog/emlog/issues/229", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-306xx/CVE-2023-30613.json b/CVE-2023/CVE-2023-306xx/CVE-2023-30613.json index b97ddb87273..3c1c95241ea 100644 --- a/CVE-2023/CVE-2023-306xx/CVE-2023-30613.json +++ b/CVE-2023/CVE-2023-306xx/CVE-2023-30613.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30613", "sourceIdentifier": "security-advisories@github.com", "published": "2023-04-24T17:15:10.863", - "lastModified": "2023-04-24T17:43:16.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-03T17:24:05.977", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +66,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kiwitcms:kiwi_tcms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.2", + "matchCriteriaId": "54963FF5-B772-4EC5-A2A1-3E98D68369C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-fwcf-753v-fgcj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://huntr.dev/bounties/c30d3503-600d-4d00-9571-98826a51f12c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://kiwitcms.org/blog/kiwi-tcms-team/2023/04/23/kiwi-tcms-122/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index a317dcf0ad7..17ebe0cc221 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-03T16:00:24.647552+00:00 +2023-05-03T18:00:24.489755+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-03T15:46:52.087000+00:00 +2023-05-03T17:55:53+00:00 ``` ### Last Data Feed Release @@ -29,117 +29,54 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -213998 +214003 ``` ### CVEs added in the last Commit -Recently added CVEs: `18` +Recently added CVEs: `5` -* [CVE-2022-46852](CVE-2022/CVE-2022-468xx/CVE-2022-46852.json) (`2023-05-03T15:15:11.190`) -* [CVE-2023-22372](CVE-2023/CVE-2023-223xx/CVE-2023-22372.json) (`2023-05-03T15:15:11.437`) -* [CVE-2023-22683](CVE-2023/CVE-2023-226xx/CVE-2023-22683.json) (`2023-05-03T14:15:30.667`) -* [CVE-2023-23785](CVE-2023/CVE-2023-237xx/CVE-2023-23785.json) (`2023-05-03T15:15:11.627`) -* [CVE-2023-23808](CVE-2023/CVE-2023-238xx/CVE-2023-23808.json) (`2023-05-03T15:15:11.770`) -* [CVE-2023-23809](CVE-2023/CVE-2023-238xx/CVE-2023-23809.json) (`2023-05-03T15:15:12.117`) -* [CVE-2023-23874](CVE-2023/CVE-2023-238xx/CVE-2023-23874.json) (`2023-05-03T14:15:31.987`) -* [CVE-2023-23876](CVE-2023/CVE-2023-238xx/CVE-2023-23876.json) (`2023-05-03T14:15:32.290`) -* [CVE-2023-24461](CVE-2023/CVE-2023-244xx/CVE-2023-24461.json) (`2023-05-03T15:15:12.310`) -* [CVE-2023-24594](CVE-2023/CVE-2023-245xx/CVE-2023-24594.json) (`2023-05-03T15:15:12.447`) -* [CVE-2023-25979](CVE-2023/CVE-2023-259xx/CVE-2023-25979.json) (`2023-05-03T14:15:32.667`) -* [CVE-2023-27378](CVE-2023/CVE-2023-273xx/CVE-2023-27378.json) (`2023-05-03T15:15:12.587`) -* [CVE-2023-28406](CVE-2023/CVE-2023-284xx/CVE-2023-28406.json) (`2023-05-03T15:15:12.720`) -* [CVE-2023-28656](CVE-2023/CVE-2023-286xx/CVE-2023-28656.json) (`2023-05-03T15:15:12.860`) -* [CVE-2023-28724](CVE-2023/CVE-2023-287xx/CVE-2023-28724.json) (`2023-05-03T15:15:13.020`) -* [CVE-2023-28742](CVE-2023/CVE-2023-287xx/CVE-2023-28742.json) (`2023-05-03T15:15:13.153`) -* [CVE-2023-29163](CVE-2023/CVE-2023-291xx/CVE-2023-29163.json) (`2023-05-03T15:15:13.287`) -* [CVE-2023-29240](CVE-2023/CVE-2023-292xx/CVE-2023-29240.json) (`2023-05-03T15:15:13.423`) +* [CVE-2023-23830](CVE-2023/CVE-2023-238xx/CVE-2023-23830.json) (`2023-05-03T16:15:09.717`) +* [CVE-2023-23875](CVE-2023/CVE-2023-238xx/CVE-2023-23875.json) (`2023-05-03T16:15:10.130`) +* [CVE-2023-23881](CVE-2023/CVE-2023-238xx/CVE-2023-23881.json) (`2023-05-03T16:15:10.237`) +* [CVE-2023-25967](CVE-2023/CVE-2023-259xx/CVE-2023-25967.json) (`2023-05-03T16:15:10.480`) +* [CVE-2023-26017](CVE-2023/CVE-2023-260xx/CVE-2023-26017.json) (`2023-05-03T16:15:10.747`) ### CVEs modified in the last Commit -Recently modified CVEs: `80` +Recently modified CVEs: `30` -* [CVE-2021-23166](CVE-2021/CVE-2021-231xx/CVE-2021-23166.json) (`2023-05-03T14:38:22.883`) -* [CVE-2021-23176](CVE-2021/CVE-2021-231xx/CVE-2021-23176.json) (`2023-05-03T14:28:25.537`) -* [CVE-2021-23178](CVE-2021/CVE-2021-231xx/CVE-2021-23178.json) (`2023-05-03T14:25:43.207`) -* [CVE-2021-44465](CVE-2021/CVE-2021-444xx/CVE-2021-44465.json) (`2023-05-03T14:12:22.630`) -* [CVE-2022-2873](CVE-2022/CVE-2022-28xx/CVE-2022-2873.json) (`2023-05-03T14:15:10.653`) -* [CVE-2022-30995](CVE-2022/CVE-2022-309xx/CVE-2022-30995.json) (`2023-05-03T14:41:11.100`) -* [CVE-2022-3405](CVE-2022/CVE-2022-34xx/CVE-2022-3405.json) (`2023-05-03T14:41:11.100`) -* [CVE-2022-3424](CVE-2022/CVE-2022-34xx/CVE-2022-3424.json) (`2023-05-03T14:15:12.830`) -* [CVE-2022-3545](CVE-2022/CVE-2022-35xx/CVE-2022-3545.json) (`2023-05-03T14:15:13.337`) -* [CVE-2022-36280](CVE-2022/CVE-2022-362xx/CVE-2022-36280.json) (`2023-05-03T14:15:12.327`) -* [CVE-2022-3707](CVE-2022/CVE-2022-37xx/CVE-2022-3707.json) (`2023-05-03T14:15:14.110`) -* [CVE-2022-40302](CVE-2022/CVE-2022-403xx/CVE-2022-40302.json) (`2023-05-03T14:41:00.093`) -* [CVE-2022-40318](CVE-2022/CVE-2022-403xx/CVE-2022-40318.json) (`2023-05-03T14:41:00.093`) -* [CVE-2022-41218](CVE-2022/CVE-2022-412xx/CVE-2022-41218.json) (`2023-05-03T14:15:14.560`) -* [CVE-2022-43681](CVE-2022/CVE-2022-436xx/CVE-2022-43681.json) (`2023-05-03T14:41:00.093`) -* [CVE-2022-45934](CVE-2022/CVE-2022-459xx/CVE-2022-45934.json) (`2023-05-03T14:15:14.953`) -* [CVE-2022-4744](CVE-2022/CVE-2022-47xx/CVE-2022-4744.json) (`2023-05-03T14:15:15.753`) -* [CVE-2022-47929](CVE-2022/CVE-2022-479xx/CVE-2022-47929.json) (`2023-05-03T14:15:15.467`) -* [CVE-2022-48150](CVE-2022/CVE-2022-481xx/CVE-2022-48150.json) (`2023-05-03T14:57:34.217`) -* [CVE-2023-0045](CVE-2023/CVE-2023-00xx/CVE-2023-0045.json) (`2023-05-03T14:15:16.303`) -* [CVE-2023-0266](CVE-2023/CVE-2023-02xx/CVE-2023-0266.json) (`2023-05-03T14:15:16.877`) -* [CVE-2023-0394](CVE-2023/CVE-2023-03xx/CVE-2023-0394.json) (`2023-05-03T14:15:17.673`) -* [CVE-2023-0458](CVE-2023/CVE-2023-04xx/CVE-2023-0458.json) (`2023-05-03T14:15:18.220`) -* [CVE-2023-0461](CVE-2023/CVE-2023-04xx/CVE-2023-0461.json) (`2023-05-03T14:15:18.783`) -* [CVE-2023-1073](CVE-2023/CVE-2023-10xx/CVE-2023-1073.json) (`2023-05-03T14:15:19.060`) -* [CVE-2023-1074](CVE-2023/CVE-2023-10xx/CVE-2023-1074.json) (`2023-05-03T14:15:19.413`) -* [CVE-2023-1078](CVE-2023/CVE-2023-10xx/CVE-2023-1078.json) (`2023-05-03T14:15:19.747`) -* [CVE-2023-1079](CVE-2023/CVE-2023-10xx/CVE-2023-1079.json) (`2023-05-03T14:15:21.417`) -* [CVE-2023-1118](CVE-2023/CVE-2023-11xx/CVE-2023-1118.json) (`2023-05-03T14:15:21.720`) -* [CVE-2023-1281](CVE-2023/CVE-2023-12xx/CVE-2023-1281.json) (`2023-05-03T14:15:23.817`) -* [CVE-2023-1383](CVE-2023/CVE-2023-13xx/CVE-2023-1383.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-1384](CVE-2023/CVE-2023-13xx/CVE-2023-1384.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-1385](CVE-2023/CVE-2023-13xx/CVE-2023-1385.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-1513](CVE-2023/CVE-2023-15xx/CVE-2023-1513.json) (`2023-05-03T14:15:24.243`) -* [CVE-2023-1670](CVE-2023/CVE-2023-16xx/CVE-2023-1670.json) (`2023-05-03T14:15:25.157`) -* [CVE-2023-1731](CVE-2023/CVE-2023-17xx/CVE-2023-1731.json) (`2023-05-03T14:21:49.653`) -* [CVE-2023-1829](CVE-2023/CVE-2023-18xx/CVE-2023-1829.json) (`2023-05-03T14:15:25.480`) -* [CVE-2023-1855](CVE-2023/CVE-2023-18xx/CVE-2023-1855.json) (`2023-05-03T14:15:25.843`) -* [CVE-2023-1989](CVE-2023/CVE-2023-19xx/CVE-2023-1989.json) (`2023-05-03T14:15:27.110`) -* [CVE-2023-1990](CVE-2023/CVE-2023-19xx/CVE-2023-1990.json) (`2023-05-03T14:15:28.543`) -* [CVE-2023-1998](CVE-2023/CVE-2023-19xx/CVE-2023-1998.json) (`2023-05-03T15:16:29.733`) -* [CVE-2023-2162](CVE-2023/CVE-2023-21xx/CVE-2023-2162.json) (`2023-05-03T14:15:33.847`) -* [CVE-2023-2194](CVE-2023/CVE-2023-21xx/CVE-2023-2194.json) (`2023-05-03T14:15:34.133`) -* [CVE-2023-2220](CVE-2023/CVE-2023-22xx/CVE-2023-2220.json) (`2023-05-03T15:26:07.897`) -* [CVE-2023-2226](CVE-2023/CVE-2023-22xx/CVE-2023-2226.json) (`2023-05-03T14:51:43.173`) -* [CVE-2023-2227](CVE-2023/CVE-2023-22xx/CVE-2023-2227.json) (`2023-05-03T14:53:27.287`) -* [CVE-2023-2228](CVE-2023/CVE-2023-22xx/CVE-2023-2228.json) (`2023-05-03T14:55:49.147`) -* [CVE-2023-2231](CVE-2023/CVE-2023-22xx/CVE-2023-2231.json) (`2023-05-03T15:22:57.563`) -* [CVE-2023-22713](CVE-2023/CVE-2023-227xx/CVE-2023-22713.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-23454](CVE-2023/CVE-2023-234xx/CVE-2023-23454.json) (`2023-05-03T14:15:31.060`) -* [CVE-2023-23455](CVE-2023/CVE-2023-234xx/CVE-2023-23455.json) (`2023-05-03T14:15:31.450`) -* [CVE-2023-23559](CVE-2023/CVE-2023-235xx/CVE-2023-23559.json) (`2023-05-03T14:15:31.700`) -* [CVE-2023-23708](CVE-2023/CVE-2023-237xx/CVE-2023-23708.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-23820](CVE-2023/CVE-2023-238xx/CVE-2023-23820.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-24818](CVE-2023/CVE-2023-248xx/CVE-2023-24818.json) (`2023-05-03T15:44:33.400`) -* [CVE-2023-25131](CVE-2023/CVE-2023-251xx/CVE-2023-25131.json) (`2023-05-03T15:29:22.673`) -* [CVE-2023-25783](CVE-2023/CVE-2023-257xx/CVE-2023-25783.json) (`2023-05-03T14:41:11.100`) -* [CVE-2023-25784](CVE-2023/CVE-2023-257xx/CVE-2023-25784.json) (`2023-05-03T14:41:11.100`) -* [CVE-2023-25786](CVE-2023/CVE-2023-257xx/CVE-2023-25786.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-25787](CVE-2023/CVE-2023-257xx/CVE-2023-25787.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-25789](CVE-2023/CVE-2023-257xx/CVE-2023-25789.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-25792](CVE-2023/CVE-2023-257xx/CVE-2023-25792.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-25796](CVE-2023/CVE-2023-257xx/CVE-2023-25796.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-25797](CVE-2023/CVE-2023-257xx/CVE-2023-25797.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-25798](CVE-2023/CVE-2023-257xx/CVE-2023-25798.json) (`2023-05-03T14:41:00.093`) -* [CVE-2023-26097](CVE-2023/CVE-2023-260xx/CVE-2023-26097.json) (`2023-05-03T15:44:39.657`) -* [CVE-2023-26099](CVE-2023/CVE-2023-260xx/CVE-2023-26099.json) (`2023-05-03T15:46:52.087`) -* [CVE-2023-26545](CVE-2023/CVE-2023-265xx/CVE-2023-26545.json) (`2023-05-03T14:15:32.977`) -* [CVE-2023-26865](CVE-2023/CVE-2023-268xx/CVE-2023-26865.json) (`2023-05-03T14:57:14.857`) -* [CVE-2023-27848](CVE-2023/CVE-2023-278xx/CVE-2023-27848.json) (`2023-05-03T15:29:21.517`) -* [CVE-2023-27990](CVE-2023/CVE-2023-279xx/CVE-2023-27990.json) (`2023-05-03T15:01:39.687`) -* [CVE-2023-27991](CVE-2023/CVE-2023-279xx/CVE-2023-27991.json) (`2023-05-03T15:04:37.820`) -* [CVE-2023-28328](CVE-2023/CVE-2023-283xx/CVE-2023-28328.json) (`2023-05-03T14:15:33.387`) -* [CVE-2023-29020](CVE-2023/CVE-2023-290xx/CVE-2023-29020.json) (`2023-05-03T14:42:00.337`) -* [CVE-2023-29579](CVE-2023/CVE-2023-295xx/CVE-2023-29579.json) (`2023-05-03T14:27:39.120`) -* [CVE-2023-29582](CVE-2023/CVE-2023-295xx/CVE-2023-29582.json) (`2023-05-03T14:29:09.613`) -* [CVE-2023-29905](CVE-2023/CVE-2023-299xx/CVE-2023-29905.json) (`2023-05-03T15:17:55.217`) -* [CVE-2023-29906](CVE-2023/CVE-2023-299xx/CVE-2023-29906.json) (`2023-05-03T15:18:18.183`) -* [CVE-2023-30456](CVE-2023/CVE-2023-304xx/CVE-2023-30456.json) (`2023-05-03T14:15:34.530`) -* [CVE-2023-30772](CVE-2023/CVE-2023-307xx/CVE-2023-30772.json) (`2023-05-03T14:15:34.807`) +* [CVE-2012-10013](CVE-2012/CVE-2012-100xx/CVE-2012-10013.json) (`2023-05-03T17:03:26.333`) +* [CVE-2012-10014](CVE-2012/CVE-2012-100xx/CVE-2012-10014.json) (`2023-05-03T17:00:58.130`) +* [CVE-2022-24249](CVE-2022/CVE-2022-242xx/CVE-2022-24249.json) (`2023-05-03T16:48:21.923`) +* [CVE-2022-27145](CVE-2022/CVE-2022-271xx/CVE-2022-27145.json) (`2023-05-03T16:48:11.460`) +* [CVE-2022-29609](CVE-2022/CVE-2022-296xx/CVE-2022-29609.json) (`2023-05-03T17:55:53.000`) +* [CVE-2022-29944](CVE-2022/CVE-2022-299xx/CVE-2022-29944.json) (`2023-05-03T17:27:22.773`) +* [CVE-2023-2251](CVE-2023/CVE-2023-22xx/CVE-2023-2251.json) (`2023-05-03T17:26:16.587`) +* [CVE-2023-22918](CVE-2023/CVE-2023-229xx/CVE-2023-22918.json) (`2023-05-03T16:58:15.893`) +* [CVE-2023-2307](CVE-2023/CVE-2023-23xx/CVE-2023-2307.json) (`2023-05-03T16:41:14.190`) +* [CVE-2023-2345](CVE-2023/CVE-2023-23xx/CVE-2023-2345.json) (`2023-05-03T16:59:03.360`) +* [CVE-2023-2346](CVE-2023/CVE-2023-23xx/CVE-2023-2346.json) (`2023-05-03T16:58:35.860`) +* [CVE-2023-2347](CVE-2023/CVE-2023-23xx/CVE-2023-2347.json) (`2023-05-03T16:58:18.770`) +* [CVE-2023-2348](CVE-2023/CVE-2023-23xx/CVE-2023-2348.json) (`2023-05-03T16:57:42.023`) +* [CVE-2023-24819](CVE-2023/CVE-2023-248xx/CVE-2023-24819.json) (`2023-05-03T16:12:07.527`) +* [CVE-2023-24820](CVE-2023/CVE-2023-248xx/CVE-2023-24820.json) (`2023-05-03T16:27:55.537`) +* [CVE-2023-26059](CVE-2023/CVE-2023-260xx/CVE-2023-26059.json) (`2023-05-03T16:06:54.337`) +* [CVE-2023-26930](CVE-2023/CVE-2023-269xx/CVE-2023-26930.json) (`2023-05-03T16:49:07.453`) +* [CVE-2023-26931](CVE-2023/CVE-2023-269xx/CVE-2023-26931.json) (`2023-05-03T16:48:11.660`) +* [CVE-2023-26934](CVE-2023/CVE-2023-269xx/CVE-2023-26934.json) (`2023-05-03T16:47:27.773`) +* [CVE-2023-26935](CVE-2023/CVE-2023-269xx/CVE-2023-26935.json) (`2023-05-03T16:46:40.757`) +* [CVE-2023-26936](CVE-2023/CVE-2023-269xx/CVE-2023-26936.json) (`2023-05-03T16:46:25.367`) +* [CVE-2023-26937](CVE-2023/CVE-2023-269xx/CVE-2023-26937.json) (`2023-05-03T16:45:53.083`) +* [CVE-2023-26938](CVE-2023/CVE-2023-269xx/CVE-2023-26938.json) (`2023-05-03T16:45:10.690`) +* [CVE-2023-29479](CVE-2023/CVE-2023-294xx/CVE-2023-29479.json) (`2023-05-03T16:56:35.370`) +* [CVE-2023-29480](CVE-2023/CVE-2023-294xx/CVE-2023-29480.json) (`2023-05-03T17:11:10.983`) +* [CVE-2023-30210](CVE-2023/CVE-2023-302xx/CVE-2023-30210.json) (`2023-05-03T16:41:53.360`) +* [CVE-2023-30211](CVE-2023/CVE-2023-302xx/CVE-2023-30211.json) (`2023-05-03T16:41:39.160`) +* [CVE-2023-30212](CVE-2023/CVE-2023-302xx/CVE-2023-30212.json) (`2023-05-03T16:38:41.690`) +* [CVE-2023-30338](CVE-2023/CVE-2023-303xx/CVE-2023-30338.json) (`2023-05-03T16:57:02.093`) +* [CVE-2023-30613](CVE-2023/CVE-2023-306xx/CVE-2023-30613.json) (`2023-05-03T17:24:05.977`) ## Download and Usage