Auto-Update: 2023-05-16T21:55:25.390018+00:00

This commit is contained in:
René Helmke 2023-05-16 23:55:28 +02:00
parent e9ff6e3b59
commit ecef3332c6
125 changed files with 1683 additions and 488 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-14025",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2017-11-06T22:29:00.303",
"lastModified": "2019-10-09T23:23:45.373",
"lastModified": "2023-05-16T20:58:31.210",
"vulnStatus": "Modified",
"descriptions": [
{
@ -95,8 +95,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:fox515t_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B283AF-E7EC-4AE1-94A8-4B08DD304D93"
"criteria": "cpe:2.3:o:hitachienergy:fox515t_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6B75DFA6-562D-4F25-BE4D-7B92978EDF77"
}
]
},
@ -106,8 +106,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:fox515t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBE4A4B0-A087-4872-8402-F402F27FEC69"
"criteria": "cpe:2.3:h:hitachienergy:fox515t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC1F4870-AED2-4DBC-ABC5-419A11F865D5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-15583",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-10-18T08:29:00.247",
"lastModified": "2017-11-08T15:57:37.507",
"lastModified": "2023-05-16T20:58:31.210",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:fox515t_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:fox515t_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "r.1.0_ics10",
"matchCriteriaId": "A0AD0130-9BC8-48EB-9CA8-9E7265442311"
"matchCriteriaId": "8FAA18B6-D3B6-441E-8406-A350F7AC713A"
}
]
},
@ -97,8 +97,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:fox515t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBE4A4B0-A087-4872-8402-F402F27FEC69"
"criteria": "cpe:2.3:h:hitachienergy:fox515t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC1F4870-AED2-4DBC-ABC5-419A11F865D5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-16731",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2017-12-20T19:29:00.287",
"lastModified": "2019-10-09T23:25:15.393",
"lastModified": "2023-05-16T20:10:13.340",
"vulnStatus": "Modified",
"descriptions": [
{
@ -94,10 +94,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:ellipse:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:ellipse:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3.0",
"versionEndIncluding": "8.9.0",
"matchCriteriaId": "15F015E6-9B80-45F5-A697-7AC96B54B67D"
"matchCriteriaId": "E063B944-8782-4CDB-9FE7-703103CCA8FA"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-1168",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2018-02-21T14:29:00.580",
"lastModified": "2023-04-19T15:32:25.210",
"lastModified": "2023-05-16T21:04:23.433",
"vulnStatus": "Modified",
"descriptions": [
{
@ -95,28 +95,28 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:sys600_firmware:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "86DF7038-6DA9-4F77-9F24-0324C02527C8"
"criteria": "cpe:2.3:o:hitachienergy:sys600_firmware:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89464622-0CF4-4FE0-AE85-441254354707"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:sys600_firmware:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB0DFE94-81A9-489C-A4BC-3E35C60F1A8C"
"criteria": "cpe:2.3:o:hitachienergy:sys600_firmware:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B3274F16-5E31-4E62-85FB-E068C11C66F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:sys600_firmware:9.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "422F311D-8F76-40CB-9178-AB3A0C96C9F0"
"criteria": "cpe:2.3:o:hitachienergy:sys600_firmware:9.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F2345B9D-4D12-47C3-850B-58D4C57EC31C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:sys600_firmware:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F42D65D8-1B26-4234-A2D3-938E7F8479C2"
"criteria": "cpe:2.3:o:hitachienergy:sys600_firmware:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "277E4664-6850-4AB1-96D3-FF0DF8A0CBF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:sys600_firmware:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0358063C-84DE-4949-96CA-C800A71B2C14"
"criteria": "cpe:2.3:o:hitachienergy:sys600_firmware:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4C2E8B-5F82-4157-B40F-72193241C2B1"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-14805",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2018-08-29T16:29:00.217",
"lastModified": "2019-10-09T23:35:14.907",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Modified",
"descriptions": [
{
@ -94,8 +94,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3A9ACA5C-C38B-43B0-902D-C49174F42F83"
"criteria": "cpe:2.3:a:hitachienergy:esoms:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EF8D2CDC-039B-4E98-A724-26F435FF0EE3"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-20720",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-01-16T03:29:00.237",
"lastModified": "2019-02-01T18:44:52.463",
"lastModified": "2023-05-16T21:02:25.137",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -85,24 +85,24 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_630_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_630_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.0",
"versionEndExcluding": "1.1.0.c0",
"matchCriteriaId": "E00AB30E-156F-4636-AF0B-09F5A466DEB8"
"matchCriteriaId": "C9577C39-BDFA-437A-9491-9A42AE894E22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_630_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_630_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.0",
"versionEndExcluding": "1.2.0.b3",
"matchCriteriaId": "D6C45BE1-E47E-4C78-BE30-539161AD0161"
"matchCriteriaId": "36DEBA57-8513-4E78-AD39-74A71D41240C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_630_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_630_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.3.0",
"versionEndExcluding": "1.3.0.a6",
"matchCriteriaId": "FB555871-B686-40B6-9E12-4C661EC85E4A"
"matchCriteriaId": "90BD9672-751F-46B2-BAF9-03B55397D76E"
}
]
},
@ -112,8 +112,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:relion_630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D1FCDD3-F26D-4EDD-8626-9C3176D065C7"
"criteria": "cpe:2.3:h:hitachienergy:relion_630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E09F1F6-68C9-4B0D-93F2-3D5F528CB2AD"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-0097",
"sourceIdentifier": "secure@intel.com",
"published": "2019-05-17T16:29:01.360",
"lastModified": "2019-06-20T16:15:11.587",
"lastModified": "2023-05-16T21:43:11.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,10 +84,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.20",
"versionEndExcluding": "12.0.35",
"matchCriteriaId": "ECCC278C-9BFE-4977-B097-D2CFC5F44C5E"
"matchCriteriaId": "5E1FE144-A9DA-406B-9BBC-BEEE40061E10"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-18247",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2019-11-27T23:15:10.790",
"lastModified": "2019-12-11T20:39:45.040",
"lastModified": "2023-05-16T21:02:25.137",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -95,9 +95,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_650_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.3.0.5",
"matchCriteriaId": "B5E645DD-1C3A-4CC4-8E2D-ADF69E337CDD"
"matchCriteriaId": "3AC0661C-6309-45AA-8A03-BD9957844A8D"
}
]
},
@ -107,8 +107,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:relion_650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69D97617-87D4-43D1-8BF6-1B50789A36CF"
"criteria": "cpe:2.3:h:hitachienergy:relion_650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C658029-20F4-411A-B1FE-B4E07D590775"
}
]
}
@ -123,9 +123,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.2.3.18",
"matchCriteriaId": "484C05AE-81EF-4B7F-A3F3-3BED2396C3C3"
"matchCriteriaId": "9550B8D1-41EB-4DB5-B63A-257EAAB55165"
}
]
},
@ -135,8 +135,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:relion_670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A97DEA9-D643-4216-98EC-0A21583CF248"
"criteria": "cpe:2.3:h:hitachienergy:relion_670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA98332-543F-48A7-B63C-B39F679D47F0"
}
]
}
@ -151,10 +151,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndIncluding": "2.0.0.11",
"matchCriteriaId": "49F28881-89FD-4D54-98C7-72D723AE7FA7"
"matchCriteriaId": "CAF1FF94-D9B8-48BB-8AF7-9614D1DEB88F"
}
]
},
@ -164,8 +164,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:relion_670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A97DEA9-D643-4216-98EC-0A21583CF248"
"criteria": "cpe:2.3:h:hitachienergy:relion_670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA98332-543F-48A7-B63C-B39F679D47F0"
}
]
}
@ -180,10 +180,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.1.0",
"versionEndIncluding": "2.1.0.1",
"matchCriteriaId": "8C41E0BA-2DA1-4FEE-BFDD-3043C39D22E0"
"matchCriteriaId": "43D3D737-99C7-4982-BC82-30E06C2114C5"
}
]
},
@ -193,8 +193,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:relion_670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A97DEA9-D643-4216-98EC-0A21583CF248"
"criteria": "cpe:2.3:h:hitachienergy:relion_670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA98332-543F-48A7-B63C-B39F679D47F0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-18253",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2019-11-27T23:15:10.867",
"lastModified": "2019-12-17T17:27:58.883",
"lastModified": "2023-05-16T21:02:25.137",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -95,30 +95,30 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1p1r26",
"matchCriteriaId": "196546A8-CC06-47CB-A411-C762DFC373C7"
"matchCriteriaId": "B464D2CA-51CC-4AE4-94F0-443DAD68A5F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2",
"versionEndExcluding": "1.2.3.17",
"matchCriteriaId": "CEBC807F-183E-43A6-AA1A-CA037D2ECF97"
"matchCriteriaId": "E53F00EC-8612-4DB6-B276-1F4E8E6C6327"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0",
"versionEndExcluding": "2.0.0.10",
"matchCriteriaId": "6EF113CE-0CF5-4645-BACB-9731FDD3CD10"
"matchCriteriaId": "199DBF17-6DFA-4AC9-B183-89CFF1619AEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.1",
"versionEndExcluding": "2.1.0.1",
"matchCriteriaId": "E052551B-A26F-4A87-9A54-9BEAED399F99"
"matchCriteriaId": "2AE2A94E-4235-4618-A06F-CC52A35812A9"
}
]
},
@ -128,8 +128,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:relion_670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A97DEA9-D643-4216-98EC-0A21583CF248"
"criteria": "cpe:2.3:h:hitachienergy:relion_670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA98332-543F-48A7-B63C-B39F679D47F0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-18998",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-02-17T19:15:12.150",
"lastModified": "2022-01-01T19:54:49.013",
"lastModified": "2023-05-16T20:06:09.550",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -114,29 +114,29 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:asset_suite:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:asset_suite:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.3.0",
"matchCriteriaId": "459C1A95-FED4-449F-8890-68E6A4B3CD4A"
"matchCriteriaId": "A6554BA4-B349-425B-993E-0EA57752CE2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:asset_suite:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:asset_suite:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.4",
"versionEndExcluding": "9.4.2.6",
"matchCriteriaId": "3EA50FEE-229D-4C1C-903F-6716FC610B10"
"matchCriteriaId": "C7004DE5-75BC-46AA-82D8-D1EC0255BBB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:asset_suite:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:asset_suite:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.5.0",
"versionEndExcluding": "9.5.3.2",
"matchCriteriaId": "B5D245F8-9CFE-4D32-ABF6-8E523487F64E"
"matchCriteriaId": "9005FA0D-504F-4016-A9FD-6F8D83DD295D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:asset_suite:9.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "48922291-B2C9-406D-B08D-418B8789F493"
"criteria": "cpe:2.3:a:hitachienergy:asset_suite:9.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "36DD2317-A06E-4514-B365-2B88F049B2C1"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19000",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:13.863",
"lastModified": "2020-04-03T17:26:04.213",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -118,10 +118,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "6.0.3",
"matchCriteriaId": "C432979D-B01E-4EB0-B5ED-DD5C78D9EFC9"
"matchCriteriaId": "4E1F2FBC-7372-4E57-A02E-83DB778FE765"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19001",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:13.940",
"lastModified": "2020-04-03T17:26:56.467",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -114,10 +114,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "6.0.2",
"matchCriteriaId": "DE07688A-B983-432B-8448-C89205019A09"
"matchCriteriaId": "C5811C31-75D6-407F-9321-655972F35EAC"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19002",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:14.003",
"lastModified": "2020-04-03T17:27:20.090",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -118,10 +118,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "6.0.2",
"matchCriteriaId": "DE07688A-B983-432B-8448-C89205019A09"
"matchCriteriaId": "C5811C31-75D6-407F-9321-655972F35EAC"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19003",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:14.097",
"lastModified": "2020-04-03T17:27:43.187",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -118,10 +118,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "6.0.2",
"matchCriteriaId": "DE07688A-B983-432B-8448-C89205019A09"
"matchCriteriaId": "C5811C31-75D6-407F-9321-655972F35EAC"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19089",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:14.423",
"lastModified": "2020-10-19T19:36:51.037",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -118,10 +118,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "6.0.3",
"matchCriteriaId": "C432979D-B01E-4EB0-B5ED-DD5C78D9EFC9"
"matchCriteriaId": "4E1F2FBC-7372-4E57-A02E-83DB778FE765"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19090",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:14.737",
"lastModified": "2020-04-03T17:28:23.327",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -114,10 +114,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "6.0.2",
"matchCriteriaId": "DE07688A-B983-432B-8448-C89205019A09"
"matchCriteriaId": "C5811C31-75D6-407F-9321-655972F35EAC"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19091",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:14.817",
"lastModified": "2020-04-03T17:28:40.907",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -118,10 +118,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "6.0.3",
"matchCriteriaId": "C432979D-B01E-4EB0-B5ED-DD5C78D9EFC9"
"matchCriteriaId": "4E1F2FBC-7372-4E57-A02E-83DB778FE765"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19092",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:14.877",
"lastModified": "2020-04-03T17:13:31.597",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -114,10 +114,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "6.0.3",
"matchCriteriaId": "C432979D-B01E-4EB0-B5ED-DD5C78D9EFC9"
"matchCriteriaId": "4E1F2FBC-7372-4E57-A02E-83DB778FE765"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19093",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:14.940",
"lastModified": "2020-04-03T17:14:57.413",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -114,10 +114,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "6.0.3",
"matchCriteriaId": "C432979D-B01E-4EB0-B5ED-DD5C78D9EFC9"
"matchCriteriaId": "4E1F2FBC-7372-4E57-A02E-83DB778FE765"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19094",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:15.017",
"lastModified": "2020-04-03T17:15:45.197",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -114,10 +114,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.9",
"versionEndIncluding": "6.0.3",
"matchCriteriaId": "80D1AD4A-13FB-4A20-B6E4-D1E7B8EBEE6A"
"matchCriteriaId": "133448CE-3482-49A7-84D1-A22B2BA9A0D2"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19095",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:15.067",
"lastModified": "2020-04-03T17:16:10.963",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -114,10 +114,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "6.0.2",
"matchCriteriaId": "DE07688A-B983-432B-8448-C89205019A09"
"matchCriteriaId": "C5811C31-75D6-407F-9321-655972F35EAC"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19096",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:15.143",
"lastModified": "2020-04-03T17:17:12.387",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -114,10 +114,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0",
"versionEndIncluding": "6.0.2",
"matchCriteriaId": "5687169F-D4B1-4214-AD8A-0FCA2A7A43F0"
"matchCriteriaId": "6E141727-91DD-4266-8E17-A1BDDD8C0124"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-19097",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2020-04-02T20:15:15.253",
"lastModified": "2020-04-03T17:18:18.810",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -118,10 +118,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "6.0.3",
"matchCriteriaId": "C432979D-B01E-4EB0-B5ED-DD5C78D9EFC9"
"matchCriteriaId": "4E1F2FBC-7372-4E57-A02E-83DB778FE765"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-5620",
"sourceIdentifier": "cve@rapid7.con",
"published": "2020-04-29T23:15:13.033",
"lastModified": "2020-05-06T18:18:07.373",
"lastModified": "2023-05-16T20:44:12.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -95,8 +95,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:microscada_pro_sys600:9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ED186AC0-9047-4DC5-9E9C-D62E0A918C75"
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0577CAD7-1C5C-40D6-B20B-56F532642583"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-22278",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2021-10-28T13:15:08.203",
"lastModified": "2021-11-03T14:17:54.957",
"lastModified": "2023-05-16T20:56:48.347",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -184,8 +184,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:pcm600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF9B4F6B-6A18-4238-AC20-B6F7044787D5"
"criteria": "cpe:2.3:h:hitachienergy:pcm600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A68C99C9-B2C1-4ADD-9B06-2BE60B583D30"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26845",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-14T22:15:08.550",
"lastModified": "2021-06-25T18:43:31.857",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -104,17 +104,17 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0",
"versionEndExcluding": "6.0.4.2.2",
"matchCriteriaId": "2A68DA45-64D3-4462-83EE-772A0A2D6CB1"
"matchCriteriaId": "9C51D950-A3F4-4886-BE24-89D489E262FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1",
"versionEndExcluding": "6.1.4",
"matchCriteriaId": "A976E924-74C4-4003-885A-1950D05E1F63"
"matchCriteriaId": "F49EF73D-12D2-40E6-BF39-237D3D7D4446"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2021-27131",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T20:15:08.987",
"lastModified": "2023-05-16T20:15:08.987",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Moodle 3.10.1 is vulnerable to persistent/stored cross-site scripting (XSS) due to the improper input sanitization on the \"Additional HTML Section\" via \"Header and Footer\" parameter in /admin/settings.php. This vulnerability is leading an attacker to steal admin and all user account cookies by storing the malicious XSS payload in Header and Footer."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/moodle/moodle",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/p4nk4jv/CVEs-Assigned/blob/master/Moodle-3.10.1-CVE-2021-27131.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-27196",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-14T22:15:11.687",
"lastModified": "2023-04-19T15:32:25.210",
"lastModified": "2023-05-16T21:04:23.433",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -105,55 +105,55 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.3",
"versionEndExcluding": "1.2.3.20",
"matchCriteriaId": "CA4A6CC3-A426-48E4-A624-EA135D60C54B"
"matchCriteriaId": "00D11467-7696-4FDB-B8DD-F2917157668B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0",
"versionEndExcluding": "2.0.0.13",
"matchCriteriaId": "BB8FA339-2E3D-40B9-9590-5724C5A3373D"
"matchCriteriaId": "28590C3A-A815-49A1-A829-520EACB98419"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.2.0",
"versionEndExcluding": "2.2.0.13",
"matchCriteriaId": "A53DB3E1-A3EB-4244-AAB7-ED89C9CF47D8"
"matchCriteriaId": "B0DA2128-1DAC-4A6C-B603-C378BE6FB913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.2.1",
"versionEndExcluding": "2.2.1.6",
"matchCriteriaId": "9F2E359C-A5FC-4600-B9D6-4B97E4EE13E3"
"matchCriteriaId": "640A3E39-8ACD-4239-A4F4-C56D9EC552F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.2.2",
"versionEndExcluding": "2.2.2.3",
"matchCriteriaId": "279C5353-63A1-4CB3-8463-034D51F5FBF5"
"matchCriteriaId": "E0B4A6B2-D92C-4BB9-BFB8-9211B90EB46F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.2.3",
"versionEndExcluding": "2.2.3.2",
"matchCriteriaId": "80870094-DE98-43F0-B753-7D6CFE70D34A"
"matchCriteriaId": "F16220A2-64E7-4203-9CCB-5D4F6BFD82CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A37FDC96-37E0-4401-9570-B8E8B8FECB64"
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E90A092F-3851-4255-8671-C4DFD2C98515"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_670_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B3399D5D-92E1-4AF3-9D78-A7AC880B8342"
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F147EE7-0312-4BA6-ABAB-31CCFCA5AA75"
}
]
},
@ -163,8 +163,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:relion_670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A97DEA9-D643-4216-98EC-0A21583CF248"
"criteria": "cpe:2.3:h:hitachienergy:relion_670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA98332-543F-48A7-B63C-B39F679D47F0"
}
]
}
@ -179,39 +179,39 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_650_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.3",
"versionEndExcluding": "1.3.0.7",
"matchCriteriaId": "A3FE5B08-BA9C-4015-9293-BFCECB50443E"
"matchCriteriaId": "D91C6882-0A32-4262-8AD1-9FF6CD394C73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_650_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.2.0",
"versionEndExcluding": "2.2.0.13",
"matchCriteriaId": "78C0028D-F60B-4640-BD87-F8A8BF814847"
"matchCriteriaId": "BBA7C4BD-7161-4D15-AD98-23E12AC3C9A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_650_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.2.1",
"versionEndExcluding": "2.2.1.6",
"matchCriteriaId": "E9C91462-07A6-42B6-8363-DF89A16D6115"
"matchCriteriaId": "C55FB92E-DCA9-494E-8A9F-E15338C1BBF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_650_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9776B341-28BE-4139-B2DD-979E3B119F8E"
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BC40F16C-2EE1-4AEE-BF48-793EFBECDACD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_650_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3379C56A-4278-42AF-BA8C-04C31F61AA7D"
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "01F1DA45-C118-4F65-B4F4-FD6A88441711"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_650_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9E7778B-2ACC-4444-89BD-58D1A5E820AE"
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C01C39-A91C-437F-BAF9-7E578D703685"
}
]
},
@ -221,8 +221,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:relion_650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69D97617-87D4-43D1-8BF6-1B50789A36CF"
"criteria": "cpe:2.3:h:hitachienergy:relion_650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C658029-20F4-411A-B1FE-B4E07D590775"
}
]
}
@ -237,10 +237,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:relion_sam600-io_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:relion_sam600-io_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.2.1",
"versionEndExcluding": "2.2.1.6",
"matchCriteriaId": "7888CD1B-C5CC-441F-B681-D353B9473B2D"
"matchCriteriaId": "B4D898A4-F841-4B84-90DB-86DE309B873C"
}
]
},
@ -250,8 +250,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:relion_sam600-io:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B064C34-4868-4FBE-B94E-5D895089AA6D"
"criteria": "cpe:2.3:h:hitachienergy:relion_sam600-io:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E73E9D1A-1DFE-4B7C-81F1-0809071A3DDB"
}
]
}
@ -266,33 +266,33 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:rtu500_firmware:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAE28AA-02FD-4FCC-9A5C-AB1377894480"
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "418011E9-2321-4441-B94F-D301BB2B8E14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:rtu500_firmware:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD60A959-1D9A-4521-A244-9D5AE5BDAD33"
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BFCBB24F-E33A-458C-82DC-38C94396E154"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:rtu500_firmware:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1BBEFAA1-5937-46C5-9B48-49E893FE7844"
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0B26BAAA-1B1D-4044-ABEA-D3EF94CE000D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:rtu500_firmware:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B26EB854-72FF-4947-8802-5802D8611385"
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "05421226-9147-40AF-8745-58F797EB35CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:rtu500_firmware:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF1EF2DF-871F-47F3-99A0-E47CD0AD9FE8"
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A9BEC4B-E339-44AE-9965-801E20F19D9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:rtu500_firmware:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D730275C-B6A4-455C-915C-1B615500F94C"
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BA3F33A-8787-4128-A790-685BCB272A82"
}
]
},
@ -361,9 +361,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:fox615_tego1_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:fox615_tego1_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "r2a16",
"matchCriteriaId": "ACBCEC74-69D4-44AA-ABAC-8D65332A0730"
"matchCriteriaId": "5F035CC8-4942-4C58-A019-4010771B0DB7"
}
]
},
@ -417,9 +417,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:gms600_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:gms600_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.3.0",
"matchCriteriaId": "E53FFA4D-74FD-44EB-955A-AB9E820E164F"
"matchCriteriaId": "898A2A1A-0874-421B-B673-9DBDD1D00BAE"
}
]
},
@ -429,8 +429,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:gms600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B6E7B90-DFBE-46D6-BFC4-1410EA5669F5"
"criteria": "cpe:2.3:h:hitachienergy:gms600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB13E178-8C41-4FDB-89AE-23D0A9930B94"
}
]
}
@ -445,17 +445,17 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:pwc600_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:pwc600_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0",
"versionEndExcluding": "1.0.1.4",
"matchCriteriaId": "C704C39C-7BF9-428E-BD7E-E9DE0FD52AB9"
"matchCriteriaId": "2CBB5AAB-60E6-4A9E-A4B4-0B26ECA49340"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:pwc600_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:hitachienergy:pwc600_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1",
"versionEndExcluding": "1.1.0.1",
"matchCriteriaId": "47D959B6-FDF8-414F-A704-995044855943"
"matchCriteriaId": "955382CE-CDF8-4706-83AC-C4DC616F84E4"
}
]
},
@ -465,8 +465,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:pwc600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49F7204E-F71C-4D03-9431-411EFBD2799E"
"criteria": "cpe:2.3:h:hitachienergy:pwc600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8CBFF7D-3B2E-4FA5-9E0C-15B78AFC8165"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-27414",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-03-11T18:15:12.010",
"lastModified": "2022-03-18T13:46:34.577",
"lastModified": "2023-05-16T20:16:56.977",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -114,9 +114,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:ellipse_enterprise_asset_management:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:ellipse_enterprise_asset_management:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.0.23",
"matchCriteriaId": "D7144095-E415-4C50-9F0B-8AB6E071C679"
"matchCriteriaId": "ACF7B46F-8E2C-46C4-98B2-5F567CB6816F"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-27416",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-03-11T18:15:12.993",
"lastModified": "2022-03-18T13:44:01.310",
"lastModified": "2023-05-16T20:16:56.977",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -114,9 +114,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:ellipse_enterprise_asset_management:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:ellipse_enterprise_asset_management:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.0.26",
"matchCriteriaId": "33A0C3D0-79B4-4CDC-A53B-35B74DEE44F7"
"matchCriteriaId": "F5EB9441-6ABE-456F-BF81-4EEEACD058CA"
}
]
}

View File

@ -2,27 +2,89 @@
"id": "CVE-2021-31239",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T02:15:08.907",
"lastModified": "2023-05-09T12:46:35.530",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T21:03:51.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue found in SQLite SQLite3 v.3.35.4 that allows a remote attacker to cause a denial of service via the appendvfs.c function."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sqlite:sqlite:3.35.4:*:*:*:*:*:*:*",
"matchCriteriaId": "49CC71C1-9555-4A7A-A2F5-76A6E94E9AD1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Tsiming/Vulnerabilities/blob/main/SQLite/CVE-2021-31239",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "https://www.sqlite.org/cves.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.sqlite.org/forum/forumpost/d9fce1a89b",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mitigation"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-35526",
"sourceIdentifier": "cybersecurity@hitachi-powergrids.com",
"published": "2021-09-08T16:15:07.337",
"lastModified": "2022-04-06T14:24:44.270",
"lastModified": "2023-05-16T20:56:48.347",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -128,8 +128,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hitachiabb-powergrids:sdm600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E727FE28-1799-4857-A250-1F751BC32030"
"criteria": "cpe:2.3:h:hitachienergy:sdm600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5FDF755-E2FE-44B7-A5EA-52D59960B5FA"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-35527",
"sourceIdentifier": "cybersecurity@hitachi-powergrids.com",
"published": "2021-07-14T14:15:08.937",
"lastModified": "2021-09-16T13:21:51.173",
"lastModified": "2023-05-16T20:21:29.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -114,9 +114,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.1",
"matchCriteriaId": "BD61300E-5D53-425E-93CA-0959D94064C7"
"matchCriteriaId": "2C83BF20-B26C-4430-B06A-DE017A5AC7EA"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-35529",
"sourceIdentifier": "cybersecurity@hitachi-powergrids.com",
"published": "2021-08-20T18:15:07.900",
"lastModified": "2021-11-28T23:33:55.077",
"lastModified": "2023-05-16T20:09:00.503",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -114,9 +114,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachiabb-powergrids:counterparty_settlement_and_billing:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:hitachienergy:counterparty_settlement_and_billing:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.7.3",
"matchCriteriaId": "56B37893-A99B-4402-8A96-F888F1E23E8B"
"matchCriteriaId": "40412B88-CA4D-4D4C-8C09-2A341FFDDBE3"
},
{
"vulnerable": true,

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-35533",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2021-11-26T17:15:07.743",
"lastModified": "2023-04-19T15:32:25.210",
"lastModified": "2023-05-16T21:04:23.433",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -115,18 +115,18 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:rtu500_firmware:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D730275C-B6A4-455C-915C-1B615500F94C"
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BA3F33A-8787-4128-A790-685BCB272A82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:rtu500_firmware:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "78495E9C-0306-4AE3-8A08-E2A052BCF087"
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD4343D-4B6E-4D6A-A2F3-EFA5CFE4290D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:rtu500_firmware:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "79B1EC06-7308-475F-A81A-BF878CDF958F"
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9CCC7155-16F2-4E60-ABCB-0E6FF71CEC67"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-28613",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2022-05-02T19:15:09.200",
"lastModified": "2023-04-19T15:32:25.210",
"lastModified": "2023-05-16T21:04:23.433",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -120,13 +120,6 @@
"versionEndExcluding": "12.2.12.0",
"matchCriteriaId": "E218D81E-9E3B-47A4-829E-8D79CC6C017A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:rtu500_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.4.1.0",
"versionEndExcluding": "12.4.12.0",
"matchCriteriaId": "710BBB85-EBEB-4F82-8160-42DD9D1181A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:*:*:*:*:*:*:*:*",
@ -134,6 +127,13 @@
"versionEndExcluding": "12.0.14.0",
"matchCriteriaId": "5651891D-EAD1-4E41-82E9-DFE762A3C35D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.4.1.0",
"versionEndExcluding": "12.4.12.0",
"matchCriteriaId": "229DCAE7-8362-4C5F-B708-9B130123DAAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:*:*:*:*:*:*:*:*",

View File

@ -2,15 +2,38 @@
"id": "CVE-2023-0536",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-08T14:15:11.597",
"lastModified": "2023-05-08T14:17:23.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T20:05:41.627",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Wp-D3 WordPress plugin through 2.4.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
@ -23,10 +46,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-d3_project:wp-d3:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.4.1",
"matchCriteriaId": "8805D715-D8D6-4C00-826D-C0AD54857D65"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/7b19d792-8083-4c0c-a45e-a99c1f5f0df0",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-1031",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-05-08T20:15:15.943",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T20:00:29.527",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `settings` endpoint and first_name parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:monicahq:monica:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "449F0227-5926-4949-8C63-CB9E2DFAEA1F"
}
]
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/napoli",
"source": "help@fluidattacks.com"
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.monicahq.com/",
"source": "help@fluidattacks.com"
"source": "help@fluidattacks.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2195",
"sourceIdentifier": "disclosure@synopsys.com",
"published": "2023-05-16T19:15:08.997",
"lastModified": "2023-05-16T19:15:08.997",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2196",
"sourceIdentifier": "disclosure@synopsys.com",
"published": "2023-05-16T18:15:16.620",
"lastModified": "2023-05-16T18:15:16.620",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,39 +2,150 @@
"id": "CVE-2023-22361",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:10.800",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T21:13:19.133",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper privilege management vulnerability in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier allows a remote authenticated attacker to alter a WebUI password of the product."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:seiko-sol:skybridge_mb-a110_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.2.0",
"matchCriteriaId": "4B4E6633-A672-41D8-8BC7-8374EF2F59DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:seiko-sol:skybridge_mb-a110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29D834FA-153B-4E9C-B88D-84BB86F3410C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:seiko-sol:skybridge_mb-a100_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.2.0",
"matchCriteriaId": "AD96E423-1212-411C-BC8D-78F3A3B6C27A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:seiko-sol:skybridge_mb-a100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1C62FA9-2A2F-4A29-95C7-3797623E9932"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN40604023/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.seiko-sol.co.jp/archives/73969/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
},
{
"url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22696",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:12.717",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T21:25:22.240",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:custom4web:affiliate_links_lite:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.5",
"matchCriteriaId": "D1E9D696-B8DD-4CC8-B553-825EEEB96645"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/affiliate-links/wordpress-affiliate-links-lite-plugin-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23794",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:12.997",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T21:32:54.857",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,12 +64,43 @@
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:semalt_blocker_project:semalt_blocker:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.3",
"matchCriteriaId": "0123B9EB-9312-4A13-B59A-0C45A52A46C0"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/semalt/wordpress-semalt-blocker-plugin-1-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23873",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:13.217",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T21:35:51.213",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bbspoiler_project:bbspoiler:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.01",
"matchCriteriaId": "A832F5AB-59A8-40B3-AD66-23EBD2ED7857"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bbspoiler/wordpress-bbspoiler-plugin-2-01-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24406",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:13.417",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T21:37:27.610",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_popup_project:simple_popup:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.8.6",
"matchCriteriaId": "2134487C-377D-47BD-A2C8-934A7B582094"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/simple-popup/wordpress-simple-popup-plugin-1-8-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25824",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-02-23T22:15:11.670",
"lastModified": "2023-03-06T16:53:08.250",
"lastModified": "2023-05-16T20:54:11.347",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -87,8 +87,8 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:mod_gnutls_project:mod_gnutls:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.9.0",
"versionEndIncluding": "1.2.0",
"matchCriteriaId": "2973B7C5-1DE3-4C32-9C47-E377F92A1871"
"versionEndExcluding": "0.12.1",
"matchCriteriaId": "3450A7C9-BABB-46EB-9418-CCBE904DB84C"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2631",
"sourceIdentifier": "disclosure@synopsys.com",
"published": "2023-05-16T19:15:09.090",
"lastModified": "2023-05-16T19:15:09.090",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2632",
"sourceIdentifier": "disclosure@synopsys.com",
"published": "2023-05-16T18:15:17.303",
"lastModified": "2023-05-16T18:15:17.303",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2633",
"sourceIdentifier": "disclosure@synopsys.com",
"published": "2023-05-16T18:15:17.453",
"lastModified": "2023-05-16T18:15:17.453",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27419",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:13.653",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T21:39:13.027",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:everestthemes:viable_blog:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.4",
"matchCriteriaId": "63AF8B3E-206E-491A-A59F-17825D2BBB0B"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/viable-blog/wordpress-viable-blog-theme-1-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27455",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:13.923",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T21:43:52.443",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mauimarketing:update_image_tag_alt_attribute:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.4.5",
"matchCriteriaId": "5D8353D0-D779-4E4A-BB65-DC0A29591437"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/update-alt-attribute/wordpress-update-image-tag-alt-attribute-plugin-2-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-27527",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:13.953",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T20:33:27.193",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Shinseiyo Sogo Soft (7.9A) and earlier improperly restricts XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the PC may be accessed by an attacker."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:touki-kyoutaku-online:shinseiyo_sogo_soft:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.9a",
"matchCriteriaId": "1849BEC6-350A-4607-8743-8D7FAA9C8932"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN73178249/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.touki-kyoutaku-online.moj.go.jp/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-27742",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T20:15:09.093",
"lastModified": "2023-05-16T20:15:09.093",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IDURAR ERP/CRM v1 was discovered to contain a SQL injection vulnerability via the component /api/login."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/G37SYS73M/CVE-2023-27742",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-27888",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:14.077",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T20:20:33.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability in Joruri Gw Ver 3.2.5 and earlier allows a remote authenticated attacker to inject an arbitrary script via Message Memo function of the affected product."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sitebridge:joruri_gw:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.2.5",
"matchCriteriaId": "F6EAF941-6590-49EF-946F-18AA670EFCEF"
}
]
}
]
}
],
"references": [
{
"url": "https://joruri-pwm.jp/org/docs/2022093000017/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jvn.jp/en/jp/JVN87559956/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2721",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.160",
"lastModified": "2023-05-16T19:15:09.160",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2722",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.217",
"lastModified": "2023-05-16T19:15:09.217",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2723",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.277",
"lastModified": "2023-05-16T19:15:09.277",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2724",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.327",
"lastModified": "2023-05-16T19:15:09.327",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2725",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.383",
"lastModified": "2023-05-16T19:15:09.383",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2726",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.433",
"lastModified": "2023-05-16T19:15:09.433",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2738",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-16T15:15:09.110",
"lastModified": "2023-05-16T15:15:09.110",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2739",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-16T16:15:10.027",
"lastModified": "2023-05-16T16:15:10.027",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2740",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-16T17:15:11.433",
"lastModified": "2023-05-16T17:15:11.433",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28076",
"sourceIdentifier": "security_alert@emc.com",
"published": "2023-05-16T16:15:09.513",
"lastModified": "2023-05-16T16:15:09.513",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28128",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-05-09T22:15:09.920",
"lastModified": "2023-05-16T18:45:46.070",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-16T20:15:09.140",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -75,6 +75,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/172398/Ivanti-Avalanche-FileStoreConfig-Shell-Upload.html",
"source": "support@hackerone.com"
},
{
"url": "https://forums.ivanti.com/s/article/ZDI-CAN-17812-Ivanti-Avalanche-FileStoreConfig-Arbitrary-File-Upload-Remote-Code-Execution-Vulnerability?language=en_US",
"source": "support@hackerone.com",

View File

@ -2,16 +2,49 @@
"id": "CVE-2023-28318",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-05-09T22:15:10.083",
"lastModified": "2023-05-10T02:29:55.237",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T20:03:20.540",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been discovered in Rocket.Chat, where messages can be hidden regardless of the Message_KeepHistory or Message_ShowDeletedStatus server configuration. This allows users to bypass the intended message deletion behavior, hiding messages and deletion notices."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "support@hackerone.com",
"type": "Secondary",
@ -23,10 +56,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rocket.chat:rocket.chat:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAE3A1B1-27A3-4FD5-BCE6-CC713F0C8B90"
}
]
}
]
}
],
"references": [
{
"url": "https://hackerone.com/reports/1379451",
"source": "support@hackerone.com"
"source": "support@hackerone.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28932",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:11.553",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T21:23:45.097",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,12 +64,43 @@
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmobile.app_project:wpmobile.app:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "11.20",
"matchCriteriaId": "994BDB2F-EFB3-4359-9B55-EC16BD265B03"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wpappninja/wordpress-wpmobile-app-plugin-11-20-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29101",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:14.147",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T21:51:49.343",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "26.7.5",
"matchCriteriaId": "25D469E0-551A-4E3E-BFDE-472DB737F8EE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-26-7-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29439",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-16T15:15:08.983",
"lastModified": "2023-05-16T15:15:08.983",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29927",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T20:15:09.213",
"lastModified": "2023-05-16T20:15:09.213",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Versions of Sage 300 through 2022 implement role-based access controls that are only enforced client-side. Low-privileged Sage users, particularly those on a workstation setup in the \"Windows Peer-to-Peer Network\" or \"Client Server Network\" Sage 300 configurations, could recover the SQL connection strings being used by Sage 300 and interact directly with the underlying database(s) to create, update, and delete all company records, bypassing the program\u2019s role-based access controls."
}
],
"metrics": {},
"references": [
{
"url": "https://www.controlgap.com/blog/critical-vulnerability-disclosure-sage-300",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-30189",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T20:15:09.273",
"lastModified": "2023-05-16T20:15:09.273",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Prestashop posstaticblocks <= 1.0.0 is vulnerable to SQL Injection via posstaticblocks::getPosCurrentHook()."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/04/27/posstaticblocks.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-30281",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T20:15:09.323",
"lastModified": "2023-05-16T20:15:09.323",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in the ps_customer table of Prestashop scquickaccounting before v3.7.3 allows attackers to access sensitive information stored in the component."
}
],
"metrics": {},
"references": [
{
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/05/04/scquickaccounting.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30501",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-05-16T19:15:09.493",
"lastModified": "2023-05-16T19:15:09.493",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30502",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-05-16T19:15:09.567",
"lastModified": "2023-05-16T19:15:09.567",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30503",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-05-16T19:15:09.630",
"lastModified": "2023-05-16T19:15:09.630",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30504",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-05-16T19:15:09.693",
"lastModified": "2023-05-16T19:15:09.693",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30505",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-05-16T19:15:09.757",
"lastModified": "2023-05-16T19:15:09.757",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30506",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-05-16T19:15:09.817",
"lastModified": "2023-05-16T19:15:09.817",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30507",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-05-16T19:15:09.893",
"lastModified": "2023-05-16T19:15:09.893",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30508",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-05-16T19:15:09.980",
"lastModified": "2023-05-16T19:15:09.980",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30509",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-05-16T19:15:10.067",
"lastModified": "2023-05-16T19:15:10.067",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30510",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-05-16T19:15:10.140",
"lastModified": "2023-05-16T19:15:10.140",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31519",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T15:15:09.217",
"lastModified": "2023-05-16T15:15:09.217",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-31544",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T21:15:09.027",
"lastModified": "2023-05-16T21:15:09.027",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in alkacon-OpenCMS v11.0.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field under the Upload Image module."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/alkacon/opencms-core/commit/21bfbeaf6b038e2c03bb421ce7f0933dd7a7633e",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/alkacon/opencms-core/issues/652",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31572",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T14:15:09.540",
"lastModified": "2023-05-16T14:15:09.540",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31576",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T14:15:09.603",
"lastModified": "2023-05-16T14:15:09.603",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31587",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T15:15:09.277",
"lastModified": "2023-05-16T15:15:09.277",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31856",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T15:15:09.350",
"lastModified": "2023-05-16T15:15:09.350",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31857",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T15:15:09.467",
"lastModified": "2023-05-16T15:15:09.467",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31890",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T16:15:10.343",
"lastModified": "2023-05-16T16:15:10.343",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32568",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T05:15:11.990",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T20:09:16.343",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -34,10 +54,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:veritas:infoscale_operations_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.4.2.800",
"matchCriteriaId": "37CC1778-2B2D-472B-B426-0B69AB2C3DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:veritas:infoscale_operations_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.0.410",
"matchCriteriaId": "266293F1-635B-4EA1-9CF7-984B4A5F0B2B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.veritas.com/content/support/en_US/security/VTS23-007",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32569",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T05:15:12.103",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T20:13:37.477",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -34,10 +54,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:veritas:infoscale_operations_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.4.2.800",
"matchCriteriaId": "37CC1778-2B2D-472B-B426-0B69AB2C3DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:veritas:infoscale_operations_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.0.410",
"matchCriteriaId": "266293F1-635B-4EA1-9CF7-984B4A5F0B2B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.veritas.com/content/support/en_US/security/VTS23-007",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-32570",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T05:15:12.190",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-16T20:48:09.520",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "VideoLAN dav1d before 1.2.0 has a thread_task.c race condition that can lead to an application crash, related to dav1d_decode_frame_exit."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:videolan:dav1d:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.0",
"matchCriteriaId": "D07D2D35-E931-463D-A3A0-95181372B263"
}
]
}
]
}
],
"references": [
{
"url": "https://code.videolan.org/videolan/dav1d/-/commit/cf617fdae0b9bfabd27282854c8e81450d955efa",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://code.videolan.org/videolan/dav1d/-/tags/1.2.0",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32977",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-05-16T16:15:10.507",
"lastModified": "2023-05-16T17:15:11.553",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32978",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-05-16T16:15:10.610",
"lastModified": "2023-05-16T17:15:11.610",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32979",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-05-16T16:15:10.673",
"lastModified": "2023-05-16T17:15:11.657",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32980",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-05-16T16:15:10.753",
"lastModified": "2023-05-16T17:15:11.703",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32981",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-05-16T16:15:10.833",
"lastModified": "2023-05-16T16:15:10.833",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32982",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-05-16T16:15:10.920",
"lastModified": "2023-05-16T16:15:10.920",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32983",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-05-16T16:15:10.980",
"lastModified": "2023-05-16T16:15:10.980",
"vulnStatus": "Received",
"lastModified": "2023-05-16T20:04:03.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

Some files were not shown because too many files have changed in this diff Show More