mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-05-16T21:55:25.390018+00:00
This commit is contained in:
parent
e9ff6e3b59
commit
ecef3332c6
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-14025",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2017-11-06T22:29:00.303",
|
||||
"lastModified": "2019-10-09T23:23:45.373",
|
||||
"lastModified": "2023-05-16T20:58:31.210",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,8 +95,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:fox515t_firmware:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4B283AF-E7EC-4AE1-94A8-4B08DD304D93"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:fox515t_firmware:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B75DFA6-562D-4F25-BE4D-7B92978EDF77"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -106,8 +106,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:fox515t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BBE4A4B0-A087-4872-8402-F402F27FEC69"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:fox515t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC1F4870-AED2-4DBC-ABC5-419A11F865D5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-15583",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-10-18T08:29:00.247",
|
||||
"lastModified": "2017-11-08T15:57:37.507",
|
||||
"lastModified": "2023-05-16T20:58:31.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:fox515t_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:fox515t_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "r.1.0_ics10",
|
||||
"matchCriteriaId": "A0AD0130-9BC8-48EB-9CA8-9E7265442311"
|
||||
"matchCriteriaId": "8FAA18B6-D3B6-441E-8406-A350F7AC713A"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +97,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:fox515t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BBE4A4B0-A087-4872-8402-F402F27FEC69"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:fox515t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC1F4870-AED2-4DBC-ABC5-419A11F865D5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-16731",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2017-12-20T19:29:00.287",
|
||||
"lastModified": "2019-10-09T23:25:15.393",
|
||||
"lastModified": "2023-05-16T20:10:13.340",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -94,10 +94,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:ellipse:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:ellipse:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.3.0",
|
||||
"versionEndIncluding": "8.9.0",
|
||||
"matchCriteriaId": "15F015E6-9B80-45F5-A697-7AC96B54B67D"
|
||||
"matchCriteriaId": "E063B944-8782-4CDB-9FE7-703103CCA8FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-1168",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2018-02-21T14:29:00.580",
|
||||
"lastModified": "2023-04-19T15:32:25.210",
|
||||
"lastModified": "2023-05-16T21:04:23.433",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,28 +95,28 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:sys600_firmware:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86DF7038-6DA9-4F77-9F24-0324C02527C8"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:sys600_firmware:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89464622-0CF4-4FE0-AE85-441254354707"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:sys600_firmware:9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB0DFE94-81A9-489C-A4BC-3E35C60F1A8C"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:sys600_firmware:9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3274F16-5E31-4E62-85FB-E068C11C66F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:sys600_firmware:9.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "422F311D-8F76-40CB-9178-AB3A0C96C9F0"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:sys600_firmware:9.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2345B9D-4D12-47C3-850B-58D4C57EC31C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:sys600_firmware:9.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F42D65D8-1B26-4234-A2D3-938E7F8479C2"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:sys600_firmware:9.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "277E4664-6850-4AB1-96D3-FF0DF8A0CBF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:sys600_firmware:9.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0358063C-84DE-4949-96CA-C800A71B2C14"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:sys600_firmware:9.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B4C2E8B-5F82-4157-B40F-72193241C2B1"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-14805",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2018-08-29T16:29:00.217",
|
||||
"lastModified": "2019-10-09T23:35:14.907",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -94,8 +94,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:6.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A9ACA5C-C38B-43B0-902D-C49174F42F83"
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:6.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EF8D2CDC-039B-4E98-A724-26F435FF0EE3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-20720",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-01-16T03:29:00.237",
|
||||
"lastModified": "2019-02-01T18:44:52.463",
|
||||
"lastModified": "2023-05-16T21:02:25.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,24 +85,24 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_630_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_630_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.1.0",
|
||||
"versionEndExcluding": "1.1.0.c0",
|
||||
"matchCriteriaId": "E00AB30E-156F-4636-AF0B-09F5A466DEB8"
|
||||
"matchCriteriaId": "C9577C39-BDFA-437A-9491-9A42AE894E22"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_630_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_630_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.2.0",
|
||||
"versionEndExcluding": "1.2.0.b3",
|
||||
"matchCriteriaId": "D6C45BE1-E47E-4C78-BE30-539161AD0161"
|
||||
"matchCriteriaId": "36DEBA57-8513-4E78-AD39-74A71D41240C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_630_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_630_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.3.0",
|
||||
"versionEndExcluding": "1.3.0.a6",
|
||||
"matchCriteriaId": "FB555871-B686-40B6-9E12-4C661EC85E4A"
|
||||
"matchCriteriaId": "90BD9672-751F-46B2-BAF9-03B55397D76E"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -112,8 +112,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:relion_630:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D1FCDD3-F26D-4EDD-8626-9C3176D065C7"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:relion_630:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E09F1F6-68C9-4B0D-93F2-3D5F528CB2AD"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-0097",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2019-05-17T16:29:01.360",
|
||||
"lastModified": "2019-06-20T16:15:11.587",
|
||||
"lastModified": "2023-05-16T21:43:11.747",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,10 +84,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.20",
|
||||
"versionEndExcluding": "12.0.35",
|
||||
"matchCriteriaId": "ECCC278C-9BFE-4977-B097-D2CFC5F44C5E"
|
||||
"matchCriteriaId": "5E1FE144-A9DA-406B-9BBC-BEEE40061E10"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-18247",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2019-11-27T23:15:10.790",
|
||||
"lastModified": "2019-12-11T20:39:45.040",
|
||||
"lastModified": "2023-05-16T21:02:25.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,9 +95,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_650_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.3.0.5",
|
||||
"matchCriteriaId": "B5E645DD-1C3A-4CC4-8E2D-ADF69E337CDD"
|
||||
"matchCriteriaId": "3AC0661C-6309-45AA-8A03-BD9957844A8D"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -107,8 +107,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:relion_650:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69D97617-87D4-43D1-8BF6-1B50789A36CF"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:relion_650:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C658029-20F4-411A-B1FE-B4E07D590775"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -123,9 +123,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.2.3.18",
|
||||
"matchCriteriaId": "484C05AE-81EF-4B7F-A3F3-3BED2396C3C3"
|
||||
"matchCriteriaId": "9550B8D1-41EB-4DB5-B63A-257EAAB55165"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -135,8 +135,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:relion_670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A97DEA9-D643-4216-98EC-0A21583CF248"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:relion_670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADA98332-543F-48A7-B63C-B39F679D47F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -151,10 +151,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndIncluding": "2.0.0.11",
|
||||
"matchCriteriaId": "49F28881-89FD-4D54-98C7-72D723AE7FA7"
|
||||
"matchCriteriaId": "CAF1FF94-D9B8-48BB-8AF7-9614D1DEB88F"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -164,8 +164,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:relion_670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A97DEA9-D643-4216-98EC-0A21583CF248"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:relion_670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADA98332-543F-48A7-B63C-B39F679D47F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -180,10 +180,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.1.0",
|
||||
"versionEndIncluding": "2.1.0.1",
|
||||
"matchCriteriaId": "8C41E0BA-2DA1-4FEE-BFDD-3043C39D22E0"
|
||||
"matchCriteriaId": "43D3D737-99C7-4982-BC82-30E06C2114C5"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -193,8 +193,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:relion_670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A97DEA9-D643-4216-98EC-0A21583CF248"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:relion_670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADA98332-543F-48A7-B63C-B39F679D47F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-18253",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2019-11-27T23:15:10.867",
|
||||
"lastModified": "2019-12-17T17:27:58.883",
|
||||
"lastModified": "2023-05-16T21:02:25.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,30 +95,30 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1p1r26",
|
||||
"matchCriteriaId": "196546A8-CC06-47CB-A411-C762DFC373C7"
|
||||
"matchCriteriaId": "B464D2CA-51CC-4AE4-94F0-443DAD68A5F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.2",
|
||||
"versionEndExcluding": "1.2.3.17",
|
||||
"matchCriteriaId": "CEBC807F-183E-43A6-AA1A-CA037D2ECF97"
|
||||
"matchCriteriaId": "E53F00EC-8612-4DB6-B276-1F4E8E6C6327"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0",
|
||||
"versionEndExcluding": "2.0.0.10",
|
||||
"matchCriteriaId": "6EF113CE-0CF5-4645-BACB-9731FDD3CD10"
|
||||
"matchCriteriaId": "199DBF17-6DFA-4AC9-B183-89CFF1619AEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.1",
|
||||
"versionEndExcluding": "2.1.0.1",
|
||||
"matchCriteriaId": "E052551B-A26F-4A87-9A54-9BEAED399F99"
|
||||
"matchCriteriaId": "2AE2A94E-4235-4618-A06F-CC52A35812A9"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -128,8 +128,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:relion_670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A97DEA9-D643-4216-98EC-0A21583CF248"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:relion_670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADA98332-543F-48A7-B63C-B39F679D47F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-18998",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-02-17T19:15:12.150",
|
||||
"lastModified": "2022-01-01T19:54:49.013",
|
||||
"lastModified": "2023-05-16T20:06:09.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,29 +114,29 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:asset_suite:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:asset_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.3.0",
|
||||
"matchCriteriaId": "459C1A95-FED4-449F-8890-68E6A4B3CD4A"
|
||||
"matchCriteriaId": "A6554BA4-B349-425B-993E-0EA57752CE2A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:asset_suite:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:asset_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.4",
|
||||
"versionEndExcluding": "9.4.2.6",
|
||||
"matchCriteriaId": "3EA50FEE-229D-4C1C-903F-6716FC610B10"
|
||||
"matchCriteriaId": "C7004DE5-75BC-46AA-82D8-D1EC0255BBB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:asset_suite:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:asset_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.5.0",
|
||||
"versionEndExcluding": "9.5.3.2",
|
||||
"matchCriteriaId": "B5D245F8-9CFE-4D32-ABF6-8E523487F64E"
|
||||
"matchCriteriaId": "9005FA0D-504F-4016-A9FD-6F8D83DD295D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:asset_suite:9.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48922291-B2C9-406D-B08D-418B8789F493"
|
||||
"criteria": "cpe:2.3:a:hitachienergy:asset_suite:9.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36DD2317-A06E-4514-B365-2B88F049B2C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19000",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:13.863",
|
||||
"lastModified": "2020-04-03T17:26:04.213",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -118,10 +118,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "6.0.3",
|
||||
"matchCriteriaId": "C432979D-B01E-4EB0-B5ED-DD5C78D9EFC9"
|
||||
"matchCriteriaId": "4E1F2FBC-7372-4E57-A02E-83DB778FE765"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19001",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:13.940",
|
||||
"lastModified": "2020-04-03T17:26:56.467",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,10 +114,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "6.0.2",
|
||||
"matchCriteriaId": "DE07688A-B983-432B-8448-C89205019A09"
|
||||
"matchCriteriaId": "C5811C31-75D6-407F-9321-655972F35EAC"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19002",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:14.003",
|
||||
"lastModified": "2020-04-03T17:27:20.090",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -118,10 +118,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "6.0.2",
|
||||
"matchCriteriaId": "DE07688A-B983-432B-8448-C89205019A09"
|
||||
"matchCriteriaId": "C5811C31-75D6-407F-9321-655972F35EAC"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19003",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:14.097",
|
||||
"lastModified": "2020-04-03T17:27:43.187",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -118,10 +118,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "6.0.2",
|
||||
"matchCriteriaId": "DE07688A-B983-432B-8448-C89205019A09"
|
||||
"matchCriteriaId": "C5811C31-75D6-407F-9321-655972F35EAC"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19089",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:14.423",
|
||||
"lastModified": "2020-10-19T19:36:51.037",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -118,10 +118,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "6.0.3",
|
||||
"matchCriteriaId": "C432979D-B01E-4EB0-B5ED-DD5C78D9EFC9"
|
||||
"matchCriteriaId": "4E1F2FBC-7372-4E57-A02E-83DB778FE765"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19090",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:14.737",
|
||||
"lastModified": "2020-04-03T17:28:23.327",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,10 +114,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "6.0.2",
|
||||
"matchCriteriaId": "DE07688A-B983-432B-8448-C89205019A09"
|
||||
"matchCriteriaId": "C5811C31-75D6-407F-9321-655972F35EAC"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19091",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:14.817",
|
||||
"lastModified": "2020-04-03T17:28:40.907",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -118,10 +118,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "6.0.3",
|
||||
"matchCriteriaId": "C432979D-B01E-4EB0-B5ED-DD5C78D9EFC9"
|
||||
"matchCriteriaId": "4E1F2FBC-7372-4E57-A02E-83DB778FE765"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19092",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:14.877",
|
||||
"lastModified": "2020-04-03T17:13:31.597",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,10 +114,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "6.0.3",
|
||||
"matchCriteriaId": "C432979D-B01E-4EB0-B5ED-DD5C78D9EFC9"
|
||||
"matchCriteriaId": "4E1F2FBC-7372-4E57-A02E-83DB778FE765"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19093",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:14.940",
|
||||
"lastModified": "2020-04-03T17:14:57.413",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,10 +114,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "6.0.3",
|
||||
"matchCriteriaId": "C432979D-B01E-4EB0-B5ED-DD5C78D9EFC9"
|
||||
"matchCriteriaId": "4E1F2FBC-7372-4E57-A02E-83DB778FE765"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19094",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:15.017",
|
||||
"lastModified": "2020-04-03T17:15:45.197",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,10 +114,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.9",
|
||||
"versionEndIncluding": "6.0.3",
|
||||
"matchCriteriaId": "80D1AD4A-13FB-4A20-B6E4-D1E7B8EBEE6A"
|
||||
"matchCriteriaId": "133448CE-3482-49A7-84D1-A22B2BA9A0D2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19095",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:15.067",
|
||||
"lastModified": "2020-04-03T17:16:10.963",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,10 +114,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "6.0.2",
|
||||
"matchCriteriaId": "DE07688A-B983-432B-8448-C89205019A09"
|
||||
"matchCriteriaId": "C5811C31-75D6-407F-9321-655972F35EAC"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19096",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:15.143",
|
||||
"lastModified": "2020-04-03T17:17:12.387",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,10 +114,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0",
|
||||
"versionEndIncluding": "6.0.2",
|
||||
"matchCriteriaId": "5687169F-D4B1-4214-AD8A-0FCA2A7A43F0"
|
||||
"matchCriteriaId": "6E141727-91DD-4266-8E17-A1BDDD8C0124"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19097",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2020-04-02T20:15:15.253",
|
||||
"lastModified": "2020-04-03T17:18:18.810",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -118,10 +118,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "6.0.3",
|
||||
"matchCriteriaId": "C432979D-B01E-4EB0-B5ED-DD5C78D9EFC9"
|
||||
"matchCriteriaId": "4E1F2FBC-7372-4E57-A02E-83DB778FE765"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-5620",
|
||||
"sourceIdentifier": "cve@rapid7.con",
|
||||
"published": "2020-04-29T23:15:13.033",
|
||||
"lastModified": "2020-05-06T18:18:07.373",
|
||||
"lastModified": "2023-05-16T20:44:12.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,8 +95,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:microscada_pro_sys600:9.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED186AC0-9047-4DC5-9E9C-D62E0A918C75"
|
||||
"criteria": "cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0577CAD7-1C5C-40D6-B20B-56F532642583"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-22278",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2021-10-28T13:15:08.203",
|
||||
"lastModified": "2021-11-03T14:17:54.957",
|
||||
"lastModified": "2023-05-16T20:56:48.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -184,8 +184,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:pcm600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FF9B4F6B-6A18-4238-AC20-B6F7044787D5"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:pcm600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A68C99C9-B2C1-4ADD-9B06-2BE60B583D30"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-26845",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-06-14T22:15:08.550",
|
||||
"lastModified": "2021-06-25T18:43:31.857",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -104,17 +104,17 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0",
|
||||
"versionEndExcluding": "6.0.4.2.2",
|
||||
"matchCriteriaId": "2A68DA45-64D3-4462-83EE-772A0A2D6CB1"
|
||||
"matchCriteriaId": "9C51D950-A3F4-4886-BE24-89D489E262FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1",
|
||||
"versionEndExcluding": "6.1.4",
|
||||
"matchCriteriaId": "A976E924-74C4-4003-885A-1950D05E1F63"
|
||||
"matchCriteriaId": "F49EF73D-12D2-40E6-BF39-237D3D7D4446"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
24
CVE-2021/CVE-2021-271xx/CVE-2021-27131.json
Normal file
24
CVE-2021/CVE-2021-271xx/CVE-2021-27131.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2021-27131",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T20:15:08.987",
|
||||
"lastModified": "2023-05-16T20:15:08.987",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Moodle 3.10.1 is vulnerable to persistent/stored cross-site scripting (XSS) due to the improper input sanitization on the \"Additional HTML Section\" via \"Header and Footer\" parameter in /admin/settings.php. This vulnerability is leading an attacker to steal admin and all user account cookies by storing the malicious XSS payload in Header and Footer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/moodle/moodle",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/p4nk4jv/CVEs-Assigned/blob/master/Moodle-3.10.1-CVE-2021-27131.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-27196",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-06-14T22:15:11.687",
|
||||
"lastModified": "2023-04-19T15:32:25.210",
|
||||
"lastModified": "2023-05-16T21:04:23.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -105,55 +105,55 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.2.3",
|
||||
"versionEndExcluding": "1.2.3.20",
|
||||
"matchCriteriaId": "CA4A6CC3-A426-48E4-A624-EA135D60C54B"
|
||||
"matchCriteriaId": "00D11467-7696-4FDB-B8DD-F2917157668B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0",
|
||||
"versionEndExcluding": "2.0.0.13",
|
||||
"matchCriteriaId": "BB8FA339-2E3D-40B9-9590-5724C5A3373D"
|
||||
"matchCriteriaId": "28590C3A-A815-49A1-A829-520EACB98419"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.0",
|
||||
"versionEndExcluding": "2.2.0.13",
|
||||
"matchCriteriaId": "A53DB3E1-A3EB-4244-AAB7-ED89C9CF47D8"
|
||||
"matchCriteriaId": "B0DA2128-1DAC-4A6C-B603-C378BE6FB913"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.1",
|
||||
"versionEndExcluding": "2.2.1.6",
|
||||
"matchCriteriaId": "9F2E359C-A5FC-4600-B9D6-4B97E4EE13E3"
|
||||
"matchCriteriaId": "640A3E39-8ACD-4239-A4F4-C56D9EC552F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.2",
|
||||
"versionEndExcluding": "2.2.2.3",
|
||||
"matchCriteriaId": "279C5353-63A1-4CB3-8463-034D51F5FBF5"
|
||||
"matchCriteriaId": "E0B4A6B2-D92C-4BB9-BFB8-9211B90EB46F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.3",
|
||||
"versionEndExcluding": "2.2.3.2",
|
||||
"matchCriteriaId": "80870094-DE98-43F0-B753-7D6CFE70D34A"
|
||||
"matchCriteriaId": "F16220A2-64E7-4203-9CCB-5D4F6BFD82CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A37FDC96-37E0-4401-9570-B8E8B8FECB64"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E90A092F-3851-4255-8671-C4DFD2C98515"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_670_firmware:2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3399D5D-92E1-4AF3-9D78-A7AC880B8342"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_670_firmware:2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F147EE7-0312-4BA6-ABAB-31CCFCA5AA75"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -163,8 +163,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:relion_670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A97DEA9-D643-4216-98EC-0A21583CF248"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:relion_670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADA98332-543F-48A7-B63C-B39F679D47F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -179,39 +179,39 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_650_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.3",
|
||||
"versionEndExcluding": "1.3.0.7",
|
||||
"matchCriteriaId": "A3FE5B08-BA9C-4015-9293-BFCECB50443E"
|
||||
"matchCriteriaId": "D91C6882-0A32-4262-8AD1-9FF6CD394C73"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_650_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.0",
|
||||
"versionEndExcluding": "2.2.0.13",
|
||||
"matchCriteriaId": "78C0028D-F60B-4640-BD87-F8A8BF814847"
|
||||
"matchCriteriaId": "BBA7C4BD-7161-4D15-AD98-23E12AC3C9A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_650_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.1",
|
||||
"versionEndExcluding": "2.2.1.6",
|
||||
"matchCriteriaId": "E9C91462-07A6-42B6-8363-DF89A16D6115"
|
||||
"matchCriteriaId": "C55FB92E-DCA9-494E-8A9F-E15338C1BBF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_650_firmware:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9776B341-28BE-4139-B2DD-979E3B119F8E"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC40F16C-2EE1-4AEE-BF48-793EFBECDACD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_650_firmware:1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3379C56A-4278-42AF-BA8C-04C31F61AA7D"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "01F1DA45-C118-4F65-B4F4-FD6A88441711"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_650_firmware:2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D9E7778B-2ACC-4444-89BD-58D1A5E820AE"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_650_firmware:2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4C01C39-A91C-437F-BAF9-7E578D703685"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -221,8 +221,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:relion_650:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69D97617-87D4-43D1-8BF6-1B50789A36CF"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:relion_650:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C658029-20F4-411A-B1FE-B4E07D590775"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -237,10 +237,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:relion_sam600-io_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:relion_sam600-io_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.1",
|
||||
"versionEndExcluding": "2.2.1.6",
|
||||
"matchCriteriaId": "7888CD1B-C5CC-441F-B681-D353B9473B2D"
|
||||
"matchCriteriaId": "B4D898A4-F841-4B84-90DB-86DE309B873C"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -250,8 +250,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:relion_sam600-io:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4B064C34-4868-4FBE-B94E-5D895089AA6D"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:relion_sam600-io:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E73E9D1A-1DFE-4B7C-81F1-0809071A3DDB"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -266,33 +266,33 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:rtu500_firmware:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BCAE28AA-02FD-4FCC-9A5C-AB1377894480"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "418011E9-2321-4441-B94F-D301BB2B8E14"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:rtu500_firmware:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD60A959-1D9A-4521-A244-9D5AE5BDAD33"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BFCBB24F-E33A-458C-82DC-38C94396E154"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:rtu500_firmware:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BBEFAA1-5937-46C5-9B48-49E893FE7844"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0B26BAAA-1B1D-4044-ABEA-D3EF94CE000D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:rtu500_firmware:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B26EB854-72FF-4947-8802-5802D8611385"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05421226-9147-40AF-8745-58F797EB35CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:rtu500_firmware:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF1EF2DF-871F-47F3-99A0-E47CD0AD9FE8"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A9BEC4B-E339-44AE-9965-801E20F19D9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:rtu500_firmware:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D730275C-B6A4-455C-915C-1B615500F94C"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BA3F33A-8787-4128-A790-685BCB272A82"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -361,9 +361,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:fox615_tego1_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:fox615_tego1_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "r2a16",
|
||||
"matchCriteriaId": "ACBCEC74-69D4-44AA-ABAC-8D65332A0730"
|
||||
"matchCriteriaId": "5F035CC8-4942-4C58-A019-4010771B0DB7"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -417,9 +417,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:gms600_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:gms600_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.3.0",
|
||||
"matchCriteriaId": "E53FFA4D-74FD-44EB-955A-AB9E820E164F"
|
||||
"matchCriteriaId": "898A2A1A-0874-421B-B673-9DBDD1D00BAE"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -429,8 +429,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:gms600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B6E7B90-DFBE-46D6-BFC4-1410EA5669F5"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:gms600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB13E178-8C41-4FDB-89AE-23D0A9930B94"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -445,17 +445,17 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:pwc600_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:pwc600_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.0",
|
||||
"versionEndExcluding": "1.0.1.4",
|
||||
"matchCriteriaId": "C704C39C-7BF9-428E-BD7E-E9DE0FD52AB9"
|
||||
"matchCriteriaId": "2CBB5AAB-60E6-4A9E-A4B4-0B26ECA49340"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:pwc600_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:hitachienergy:pwc600_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.1",
|
||||
"versionEndExcluding": "1.1.0.1",
|
||||
"matchCriteriaId": "47D959B6-FDF8-414F-A704-995044855943"
|
||||
"matchCriteriaId": "955382CE-CDF8-4706-83AC-C4DC616F84E4"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -465,8 +465,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:abb:pwc600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49F7204E-F71C-4D03-9431-411EFBD2799E"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:pwc600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C8CBFF7D-3B2E-4FA5-9E0C-15B78AFC8165"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-27414",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2022-03-11T18:15:12.010",
|
||||
"lastModified": "2022-03-18T13:46:34.577",
|
||||
"lastModified": "2023-05-16T20:16:56.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,9 +114,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:ellipse_enterprise_asset_management:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:ellipse_enterprise_asset_management:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.0.23",
|
||||
"matchCriteriaId": "D7144095-E415-4C50-9F0B-8AB6E071C679"
|
||||
"matchCriteriaId": "ACF7B46F-8E2C-46C4-98B2-5F567CB6816F"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-27416",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2022-03-11T18:15:12.993",
|
||||
"lastModified": "2022-03-18T13:44:01.310",
|
||||
"lastModified": "2023-05-16T20:16:56.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,9 +114,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:ellipse_enterprise_asset_management:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:ellipse_enterprise_asset_management:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.0.26",
|
||||
"matchCriteriaId": "33A0C3D0-79B4-4CDC-A53B-35B74DEE44F7"
|
||||
"matchCriteriaId": "F5EB9441-6ABE-456F-BF81-4EEEACD058CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,27 +2,89 @@
|
||||
"id": "CVE-2021-31239",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-09T02:15:08.907",
|
||||
"lastModified": "2023-05-09T12:46:35.530",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T21:03:51.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue found in SQLite SQLite3 v.3.35.4 that allows a remote attacker to cause a denial of service via the appendvfs.c function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sqlite:sqlite:3.35.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49CC71C1-9555-4A7A-A2F5-76A6E94E9AD1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Tsiming/Vulnerabilities/blob/main/SQLite/CVE-2021-31239",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sqlite.org/cves.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sqlite.org/forum/forumpost/d9fce1a89b",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mitigation"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-35526",
|
||||
"sourceIdentifier": "cybersecurity@hitachi-powergrids.com",
|
||||
"published": "2021-09-08T16:15:07.337",
|
||||
"lastModified": "2022-04-06T14:24:44.270",
|
||||
"lastModified": "2023-05-16T20:56:48.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -128,8 +128,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hitachiabb-powergrids:sdm600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E727FE28-1799-4857-A250-1F751BC32030"
|
||||
"criteria": "cpe:2.3:h:hitachienergy:sdm600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5FDF755-E2FE-44B7-A5EA-52D59960B5FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-35527",
|
||||
"sourceIdentifier": "cybersecurity@hitachi-powergrids.com",
|
||||
"published": "2021-07-14T14:15:08.937",
|
||||
"lastModified": "2021-09-16T13:21:51.173",
|
||||
"lastModified": "2023-05-16T20:21:29.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,9 +114,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:abb:esoms:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.3.1",
|
||||
"matchCriteriaId": "BD61300E-5D53-425E-93CA-0959D94064C7"
|
||||
"matchCriteriaId": "2C83BF20-B26C-4430-B06A-DE017A5AC7EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-35529",
|
||||
"sourceIdentifier": "cybersecurity@hitachi-powergrids.com",
|
||||
"published": "2021-08-20T18:15:07.900",
|
||||
"lastModified": "2021-11-28T23:33:55.077",
|
||||
"lastModified": "2023-05-16T20:09:00.503",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,9 +114,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachiabb-powergrids:counterparty_settlement_and_billing:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:hitachienergy:counterparty_settlement_and_billing:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.7.3",
|
||||
"matchCriteriaId": "56B37893-A99B-4402-8A96-F888F1E23E8B"
|
||||
"matchCriteriaId": "40412B88-CA4D-4D4C-8C09-2A341FFDDBE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-35533",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2021-11-26T17:15:07.743",
|
||||
"lastModified": "2023-04-19T15:32:25.210",
|
||||
"lastModified": "2023-05-16T21:04:23.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -115,18 +115,18 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:rtu500_firmware:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D730275C-B6A4-455C-915C-1B615500F94C"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BA3F33A-8787-4128-A790-685BCB272A82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:rtu500_firmware:12.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78495E9C-0306-4AE3-8A08-E2A052BCF087"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:12.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCD4343D-4B6E-4D6A-A2F3-EFA5CFE4290D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:rtu500_firmware:12.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79B1EC06-7308-475F-A81A-BF878CDF958F"
|
||||
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:12.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CCC7155-16F2-4E60-ABCB-0E6FF71CEC67"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-28613",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2022-05-02T19:15:09.200",
|
||||
"lastModified": "2023-04-19T15:32:25.210",
|
||||
"lastModified": "2023-05-16T21:04:23.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -120,13 +120,6 @@
|
||||
"versionEndExcluding": "12.2.12.0",
|
||||
"matchCriteriaId": "E218D81E-9E3B-47A4-829E-8D79CC6C017A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:abb:rtu500_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.4.1.0",
|
||||
"versionEndExcluding": "12.4.12.0",
|
||||
"matchCriteriaId": "710BBB85-EBEB-4F82-8160-42DD9D1181A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:*:*:*:*:*:*:*:*",
|
||||
@ -134,6 +127,13 @@
|
||||
"versionEndExcluding": "12.0.14.0",
|
||||
"matchCriteriaId": "5651891D-EAD1-4E41-82E9-DFE762A3C35D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.4.1.0",
|
||||
"versionEndExcluding": "12.4.12.0",
|
||||
"matchCriteriaId": "229DCAE7-8362-4C5F-B708-9B130123DAAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:*:*:*:*:*:*:*:*",
|
||||
|
@ -2,15 +2,38 @@
|
||||
"id": "CVE-2023-0536",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-08T14:15:11.597",
|
||||
"lastModified": "2023-05-08T14:17:23.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T20:05:41.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Wp-D3 WordPress plugin through 2.4.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
@ -23,10 +46,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wp-d3_project:wp-d3:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.4.1",
|
||||
"matchCriteriaId": "8805D715-D8D6-4C00-826D-C0AD54857D65"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7b19d792-8083-4c0c-a45e-a99c1f5f0df0",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,82 @@
|
||||
"id": "CVE-2023-1031",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-05-08T20:15:15.943",
|
||||
"lastModified": "2023-05-09T12:47:05.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T20:00:29.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `settings` endpoint and first_name parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:monicahq:monica:4.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "449F0227-5926-4949-8C63-CB9E2DFAEA1F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/napoli",
|
||||
"source": "help@fluidattacks.com"
|
||||
"source": "help@fluidattacks.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.monicahq.com/",
|
||||
"source": "help@fluidattacks.com"
|
||||
"source": "help@fluidattacks.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2195",
|
||||
"sourceIdentifier": "disclosure@synopsys.com",
|
||||
"published": "2023-05-16T19:15:08.997",
|
||||
"lastModified": "2023-05-16T19:15:08.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2196",
|
||||
"sourceIdentifier": "disclosure@synopsys.com",
|
||||
"published": "2023-05-16T18:15:16.620",
|
||||
"lastModified": "2023-05-16T18:15:16.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,39 +2,150 @@
|
||||
"id": "CVE-2023-22361",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:10.800",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T21:13:19.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper privilege management vulnerability in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier allows a remote authenticated attacker to alter a WebUI password of the product."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:seiko-sol:skybridge_mb-a110_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.2.0",
|
||||
"matchCriteriaId": "4B4E6633-A672-41D8-8BC7-8374EF2F59DC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:seiko-sol:skybridge_mb-a110:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29D834FA-153B-4E9C-B88D-84BB86F3410C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:seiko-sol:skybridge_mb-a100_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.2.0",
|
||||
"matchCriteriaId": "AD96E423-1212-411C-BC8D-78F3A3B6C27A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:seiko-sol:skybridge_mb-a100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1C62FA9-2A2F-4A29-95C7-3797623E9932"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN40604023/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.seiko-sol.co.jp/archives/73969/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a100/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a130/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.seiko-sol.co.jp/products/skybridge/skybridge_download/mb-a200/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.seiko-sol.co.jp/products/skyspider/skyspider_download/mb-r210/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22696",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:12.717",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T21:25:22.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:custom4web:affiliate_links_lite:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.5",
|
||||
"matchCriteriaId": "D1E9D696-B8DD-4CC8-B553-825EEEB96645"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/affiliate-links/wordpress-affiliate-links-lite-plugin-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23794",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:12.997",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T21:32:54.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -36,7 +56,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -44,12 +64,43 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:semalt_blocker_project:semalt_blocker:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1.3",
|
||||
"matchCriteriaId": "0123B9EB-9312-4A13-B59A-0C45A52A46C0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/semalt/wordpress-semalt-blocker-plugin-1-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23873",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:13.217",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T21:35:51.213",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bbspoiler_project:bbspoiler:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.01",
|
||||
"matchCriteriaId": "A832F5AB-59A8-40B3-AD66-23EBD2ED7857"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/bbspoiler/wordpress-bbspoiler-plugin-2-01-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24406",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:13.417",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T21:37:27.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:simple_popup_project:simple_popup:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.8.6",
|
||||
"matchCriteriaId": "2134487C-377D-47BD-A2C8-934A7B582094"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/simple-popup/wordpress-simple-popup-plugin-1-8-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25824",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-02-23T22:15:11.670",
|
||||
"lastModified": "2023-03-06T16:53:08.250",
|
||||
"lastModified": "2023-05-16T20:54:11.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -87,8 +87,8 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mod_gnutls_project:mod_gnutls:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "0.9.0",
|
||||
"versionEndIncluding": "1.2.0",
|
||||
"matchCriteriaId": "2973B7C5-1DE3-4C32-9C47-E377F92A1871"
|
||||
"versionEndExcluding": "0.12.1",
|
||||
"matchCriteriaId": "3450A7C9-BABB-46EB-9418-CCBE904DB84C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2631",
|
||||
"sourceIdentifier": "disclosure@synopsys.com",
|
||||
"published": "2023-05-16T19:15:09.090",
|
||||
"lastModified": "2023-05-16T19:15:09.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2632",
|
||||
"sourceIdentifier": "disclosure@synopsys.com",
|
||||
"published": "2023-05-16T18:15:17.303",
|
||||
"lastModified": "2023-05-16T18:15:17.303",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2633",
|
||||
"sourceIdentifier": "disclosure@synopsys.com",
|
||||
"published": "2023-05-16T18:15:17.453",
|
||||
"lastModified": "2023-05-16T18:15:17.453",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27419",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:13.653",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T21:39:13.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:everestthemes:viable_blog:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1.4",
|
||||
"matchCriteriaId": "63AF8B3E-206E-491A-A59F-17825D2BBB0B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/viable-blog/wordpress-viable-blog-theme-1-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27455",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:13.923",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T21:43:52.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mauimarketing:update_image_tag_alt_attribute:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.4.5",
|
||||
"matchCriteriaId": "5D8353D0-D779-4E4A-BB65-DC0A29591437"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/update-alt-attribute/wordpress-update-image-tag-alt-attribute-plugin-2-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,82 @@
|
||||
"id": "CVE-2023-27527",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:13.953",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T20:33:27.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shinseiyo Sogo Soft (7.9A) and earlier improperly restricts XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the PC may be accessed by an attacker."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:touki-kyoutaku-online:shinseiyo_sogo_soft:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "7.9a",
|
||||
"matchCriteriaId": "1849BEC6-350A-4607-8743-8D7FAA9C8932"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN73178249/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.touki-kyoutaku-online.moj.go.jp/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-277xx/CVE-2023-27742.json
Normal file
20
CVE-2023/CVE-2023-277xx/CVE-2023-27742.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-27742",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T20:15:09.093",
|
||||
"lastModified": "2023-05-16T20:15:09.093",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IDURAR ERP/CRM v1 was discovered to contain a SQL injection vulnerability via the component /api/login."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/G37SYS73M/CVE-2023-27742",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,82 @@
|
||||
"id": "CVE-2023-27888",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:14.077",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T20:20:33.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site scripting vulnerability in Joruri Gw Ver 3.2.5 and earlier allows a remote authenticated attacker to inject an arbitrary script via Message Memo function of the affected product."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sitebridge:joruri_gw:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.2.5",
|
||||
"matchCriteriaId": "F6EAF941-6590-49EF-946F-18AA670EFCEF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://joruri-pwm.jp/org/docs/2022093000017/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN87559956/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2721",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-16T19:15:09.160",
|
||||
"lastModified": "2023-05-16T19:15:09.160",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2722",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-16T19:15:09.217",
|
||||
"lastModified": "2023-05-16T19:15:09.217",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2723",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-16T19:15:09.277",
|
||||
"lastModified": "2023-05-16T19:15:09.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2724",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-16T19:15:09.327",
|
||||
"lastModified": "2023-05-16T19:15:09.327",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2725",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-16T19:15:09.383",
|
||||
"lastModified": "2023-05-16T19:15:09.383",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2726",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-16T19:15:09.433",
|
||||
"lastModified": "2023-05-16T19:15:09.433",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2738",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-16T15:15:09.110",
|
||||
"lastModified": "2023-05-16T15:15:09.110",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2739",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-16T16:15:10.027",
|
||||
"lastModified": "2023-05-16T16:15:10.027",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2740",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-16T17:15:11.433",
|
||||
"lastModified": "2023-05-16T17:15:11.433",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28076",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2023-05-16T16:15:09.513",
|
||||
"lastModified": "2023-05-16T16:15:09.513",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28128",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-05-09T22:15:09.920",
|
||||
"lastModified": "2023-05-16T18:45:46.070",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-16T20:15:09.140",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -75,6 +75,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/172398/Ivanti-Avalanche-FileStoreConfig-Shell-Upload.html",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/ZDI-CAN-17812-Ivanti-Avalanche-FileStoreConfig-Arbitrary-File-Upload-Remote-Code-Execution-Vulnerability?language=en_US",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,16 +2,49 @@
|
||||
"id": "CVE-2023-28318",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-05-09T22:15:10.083",
|
||||
"lastModified": "2023-05-10T02:29:55.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T20:03:20.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been discovered in Rocket.Chat, where messages can be hidden regardless of the Message_KeepHistory or Message_ShowDeletedStatus server configuration. This allows users to bypass the intended message deletion behavior, hiding messages and deletion notices."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
@ -23,10 +56,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rocket.chat:rocket.chat:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EAE3A1B1-27A3-4FD5-BCE6-CC713F0C8B90"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hackerone.com/reports/1379451",
|
||||
"source": "support@hackerone.com"
|
||||
"source": "support@hackerone.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28932",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T08:15:11.553",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T21:23:45.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -36,7 +56,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -44,12 +64,43 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpmobile.app_project:wpmobile.app:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "11.20",
|
||||
"matchCriteriaId": "994BDB2F-EFB3-4359-9B55-EC16BD265B03"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wpappninja/wordpress-wpmobile-app-plugin-11-20-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29101",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:14.147",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T21:51:49.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "26.7.5",
|
||||
"matchCriteriaId": "25D469E0-551A-4E3E-BFDE-472DB737F8EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/betheme/wordpress-betheme-theme-26-7-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29439",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-16T15:15:08.983",
|
||||
"lastModified": "2023-05-16T15:15:08.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2023/CVE-2023-299xx/CVE-2023-29927.json
Normal file
20
CVE-2023/CVE-2023-299xx/CVE-2023-29927.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-29927",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T20:15:09.213",
|
||||
"lastModified": "2023-05-16T20:15:09.213",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Versions of Sage 300 through 2022 implement role-based access controls that are only enforced client-side. Low-privileged Sage users, particularly those on a workstation setup in the \"Windows Peer-to-Peer Network\" or \"Client Server Network\" Sage 300 configurations, could recover the SQL connection strings being used by Sage 300 and interact directly with the underlying database(s) to create, update, and delete all company records, bypassing the program\u2019s role-based access controls."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.controlgap.com/blog/critical-vulnerability-disclosure-sage-300",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-301xx/CVE-2023-30189.json
Normal file
43
CVE-2023/CVE-2023-301xx/CVE-2023-30189.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-30189",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T20:15:09.273",
|
||||
"lastModified": "2023-05-16T20:15:09.273",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Prestashop posstaticblocks <= 1.0.0 is vulnerable to SQL Injection via posstaticblocks::getPosCurrentHook()."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/04/27/posstaticblocks.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-302xx/CVE-2023-30281.json
Normal file
20
CVE-2023/CVE-2023-302xx/CVE-2023-30281.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-30281",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T20:15:09.323",
|
||||
"lastModified": "2023-05-16T20:15:09.323",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure permissions in the ps_customer table of Prestashop scquickaccounting before v3.7.3 allows attackers to access sensitive information stored in the component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/05/04/scquickaccounting.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30501",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-05-16T19:15:09.493",
|
||||
"lastModified": "2023-05-16T19:15:09.493",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30502",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-05-16T19:15:09.567",
|
||||
"lastModified": "2023-05-16T19:15:09.567",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30503",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-05-16T19:15:09.630",
|
||||
"lastModified": "2023-05-16T19:15:09.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30504",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-05-16T19:15:09.693",
|
||||
"lastModified": "2023-05-16T19:15:09.693",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30505",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-05-16T19:15:09.757",
|
||||
"lastModified": "2023-05-16T19:15:09.757",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30506",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-05-16T19:15:09.817",
|
||||
"lastModified": "2023-05-16T19:15:09.817",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30507",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-05-16T19:15:09.893",
|
||||
"lastModified": "2023-05-16T19:15:09.893",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30508",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-05-16T19:15:09.980",
|
||||
"lastModified": "2023-05-16T19:15:09.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30509",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-05-16T19:15:10.067",
|
||||
"lastModified": "2023-05-16T19:15:10.067",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30510",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-05-16T19:15:10.140",
|
||||
"lastModified": "2023-05-16T19:15:10.140",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31519",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T15:15:09.217",
|
||||
"lastModified": "2023-05-16T15:15:09.217",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
24
CVE-2023/CVE-2023-315xx/CVE-2023-31544.json
Normal file
24
CVE-2023/CVE-2023-315xx/CVE-2023-31544.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-31544",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T21:15:09.027",
|
||||
"lastModified": "2023-05-16T21:15:09.027",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in alkacon-OpenCMS v11.0.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field under the Upload Image module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/alkacon/opencms-core/commit/21bfbeaf6b038e2c03bb421ce7f0933dd7a7633e",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/alkacon/opencms-core/issues/652",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31572",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T14:15:09.540",
|
||||
"lastModified": "2023-05-16T14:15:09.540",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31576",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T14:15:09.603",
|
||||
"lastModified": "2023-05-16T14:15:09.603",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31587",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T15:15:09.277",
|
||||
"lastModified": "2023-05-16T15:15:09.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31856",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T15:15:09.350",
|
||||
"lastModified": "2023-05-16T15:15:09.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31857",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T15:15:09.467",
|
||||
"lastModified": "2023-05-16T15:15:09.467",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31890",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-16T16:15:10.343",
|
||||
"lastModified": "2023-05-16T16:15:10.343",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32568",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T05:15:11.990",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T20:09:16.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -34,10 +54,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:veritas:infoscale_operations_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.4.2.800",
|
||||
"matchCriteriaId": "37CC1778-2B2D-472B-B426-0B69AB2C3DF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:veritas:infoscale_operations_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "8.0.410",
|
||||
"matchCriteriaId": "266293F1-635B-4EA1-9CF7-984B4A5F0B2B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.veritas.com/content/support/en_US/security/VTS23-007",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32569",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T05:15:12.103",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T20:13:37.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -34,10 +54,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:veritas:infoscale_operations_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.4.2.800",
|
||||
"matchCriteriaId": "37CC1778-2B2D-472B-B426-0B69AB2C3DF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:veritas:infoscale_operations_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "8.0.410",
|
||||
"matchCriteriaId": "266293F1-635B-4EA1-9CF7-984B4A5F0B2B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.veritas.com/content/support/en_US/security/VTS23-007",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,82 @@
|
||||
"id": "CVE-2023-32570",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T05:15:12.190",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-16T20:48:09.520",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VideoLAN dav1d before 1.2.0 has a thread_task.c race condition that can lead to an application crash, related to dav1d_decode_frame_exit."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:videolan:dav1d:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2.0",
|
||||
"matchCriteriaId": "D07D2D35-E931-463D-A3A0-95181372B263"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code.videolan.org/videolan/dav1d/-/commit/cf617fdae0b9bfabd27282854c8e81450d955efa",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://code.videolan.org/videolan/dav1d/-/tags/1.2.0",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32977",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-05-16T16:15:10.507",
|
||||
"lastModified": "2023-05-16T17:15:11.553",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32978",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-05-16T16:15:10.610",
|
||||
"lastModified": "2023-05-16T17:15:11.610",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32979",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-05-16T16:15:10.673",
|
||||
"lastModified": "2023-05-16T17:15:11.657",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32980",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-05-16T16:15:10.753",
|
||||
"lastModified": "2023-05-16T17:15:11.703",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32981",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-05-16T16:15:10.833",
|
||||
"lastModified": "2023-05-16T16:15:10.833",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32982",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-05-16T16:15:10.920",
|
||||
"lastModified": "2023-05-16T16:15:10.920",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32983",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-05-16T16:15:10.980",
|
||||
"lastModified": "2023-05-16T16:15:10.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-16T20:04:03.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user