Auto-Update: 2023-05-31T02:00:26.345283+00:00

This commit is contained in:
cad-safe-bot 2023-05-31 02:00:30 +00:00
parent 4f209f2aae
commit edc4ae6924
39 changed files with 6187 additions and 108 deletions

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2012-10015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T00:15:09.417",
"lastModified": "2023-05-31T00:15:09.417",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in BestWebSoft Twitter Plugin up to 2.14 on WordPress. It has been classified as problematic. Affected is the function twttr_settings_page of the file twitter.php of the component Settings Page. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. Upgrading to version 2.15 is able to address this issue. The name of the patch is a6d4659cbb2cbf18ccb0fb43549d5113d74e0146. It is recommended to upgrade the affected component. VDB-230154 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/wp-plugins/twitter-plugin/commit/a6d4659cbb2cbf18ccb0fb43549d5113d74e0146",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.230154",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.230154",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2021-31233",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T01:15:42.983",
"lastModified": "2023-05-31T01:15:42.983",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability found in Fighting Cock Information System v.1.0 allows a remote attacker to obtain sensitive information via the edit_breed.php parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gabesolomon/CVE-2021-31233",
"source": "cve@mitre.org"
},
{
"url": "https://www.sourcecodester.com/php/12824/fighting-cock-information-system.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45364",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-24T16:15:09.307",
"lastModified": "2023-05-25T12:40:42.083",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T00:46:51.457",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codedropz:drag_and_drop_multiple_file_upload_-_contact_form_7:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.6.5",
"matchCriteriaId": "5414DF00-1208-4B09-848D-72EA808C3D33"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/drag-and-drop-multiple-file-upload-contact-form-7/wordpress-drag-and-drop-multiple-file-upload-contact-form-7-plugin-1-3-6-5-multiple-csrf-vulnerabilities?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46738",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T23:15:09.350",
"lastModified": "2023-05-23T13:04:39.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T01:43:24.730",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,14 +66,640 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "05060302-F6DE-4EAF-9356-8CD785ABDE7D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "936B8451-A674-49D7-91EC-A03599A6D6AE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "6D2071B9-BF2C-4A12-BA35-32BB59E210DB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1469E464-6784-4B0B-9895-79BA5A1A1CB8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "166422E2-0734-4F7E-B2FE-0EB461AFDD32"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82C1859A-0D39-4D69-B89F-E6AB92D71A38"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "80159239-E373-4399-AF14-5FC3B1F7BFBF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A017B904-A3C4-4070-96F7-9679FD2383C9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "7FCCC5B8-ED6E-4FCA-BA07-4D2AA1D26F50"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23BC31CA-2061-4141-8600-EF4A9AE7DD2A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "D43D904E-6B72-44B4-A158-D6A7C30504A3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1A43409-AF18-4BD5-A0D4-D27CDD6ABBE6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "AB35A114-99E7-44C6-B53B-B293AA9D9815"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56E2CAAD-8A4D-4F1A-AEF0-034C02965935"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "C37DFE8A-F733-48D3-8BF6-ECC98A476C54"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACA11FBB-1B4C-4F66-89EF-2D91C0161C4C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "DAD2CA81-44E6-4499-9F5C-502F060A3B8F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58CE9F4A-74BD-4AFC-B019-5D750E2D1E16"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "6E012434-72F0-4BD6-ACA4-DF7E12FB9033"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B64FEC33-D6D9-4F4C-BE43-31D637E6B01F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "F08FCBA2-94B8-44F9-921F-0CDD03D7903A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B1D3E7F-9C2F-48F8-BF49-539570A0986A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "3577400F-ADC8-4EBF-AFEE-DE165391BE12"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFC4885-AF94-471E-AE4E-DD26A6A91667"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "02EF4F49-FCB7-44C8-BC83-8A3519807338"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12B9705B-B21D-450B-A62B-933DC81A19E1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "B170FD2A-0422-4778-812F-EBCDF19A1253"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B786B2F4-6586-4E05-BDE9-DFDBA7BD3739"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "2CC4192B-D9F4-4886-BDDE-5859A89B6221"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEBA453E-67D9-4760-89A6-6CF8C632C6A4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "A64CD7F9-D8BB-4717-90B5-FBFE01B00CB5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5042C3C1-3964-437B-98C1-0458F73B7197"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "AB49899D-165E-4B57-A3F5-D6ADDD138E12"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD2B738-620D-42F8-881C-A6B293B724BA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "E032CC0E-0E19-490A-B3A2-5BA82DA52FC0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C46D12-6699-4BAC-AC47-7B150AECAF9B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "CE9621CA-4AC7-4BA5-940D-E76E795502A2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1139B205-02DA-4155-897C-F5D4191686A8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "BC0AB74D-DFDD-4B8F-9AFB-158E8C09A6F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C10BFD7F-0EDC-4CA0-9BEE-2CD0C83CAA05"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "EF765E11-57A1-444F-840B-321944679F4B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "518EE433-9E08-40FE-90F7-48E8AC934743"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "D4AD7C27-EFF5-4302-9B7F-0AFF190F1893"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1522EB30-AB31-47E3-B2EB-90CE231C284B"
}
]
}
]
}
],
"references": [
{
"url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46794",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-24T16:15:09.380",
"lastModified": "2023-05-25T12:40:42.083",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T00:49:12.070",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:weightbasedshipping:woocommerce_weight_based_shipping:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "5.4.1",
"matchCriteriaId": "207BB141-8732-4216-AC0D-CBDD66621FF3"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/weight-based-shipping-for-woocommerce/wordpress-woocommerce-weight-based-shipping-plugin-5-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46816",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-24T16:15:09.457",
"lastModified": "2023-05-25T12:40:42.083",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T00:52:43.880",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bookingultrapro:booking_ultra_pro_appointments_booking_calendar:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.4",
"matchCriteriaId": "AE3BA61E-D980-4DF5-8710-727AF56CCEBC"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/booking-ultra-pro/wordpress-booking-ultra-pro-appointments-booking-calendar-plugin-plugin-1-1-4-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47136",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-25T12:15:10.157",
"lastModified": "2023-05-25T12:40:12.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T00:22:02.713",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmanageninja:ninja_tables:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.3.4",
"matchCriteriaId": "9A71DD56-FD3F-40AF-9808-8CC2315C5BDB"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ninja-tables/wordpress-ninja-tables-best-data-table-plugin-for-wordpress-plugin-4-3-4-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47152",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-24T16:15:09.530",
"lastModified": "2023-05-25T12:40:42.083",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T00:56:36.890",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clickfunnels:clickfunnels:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.1.1",
"matchCriteriaId": "69693061-CFAA-443B-8CEC-99A58D39A2EB"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/clickfunnels/wordpress-clickfunnels-plugin-3-1-1-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47180",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-24T16:15:09.607",
"lastModified": "2023-05-25T12:40:42.083",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T00:59:02.133",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kopatheme:kopa_framework:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.5",
"matchCriteriaId": "9041E284-932D-43F6-9572-559A1D9A4362"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/kopatheme/wordpress-kopa-framework-plugin-1-3-5-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47320",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T23:15:09.493",
"lastModified": "2023-05-23T13:04:39.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T01:35:19.820",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,14 +66,640 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "05060302-F6DE-4EAF-9356-8CD785ABDE7D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "936B8451-A674-49D7-91EC-A03599A6D6AE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "6D2071B9-BF2C-4A12-BA35-32BB59E210DB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1469E464-6784-4B0B-9895-79BA5A1A1CB8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "166422E2-0734-4F7E-B2FE-0EB461AFDD32"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82C1859A-0D39-4D69-B89F-E6AB92D71A38"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "80159239-E373-4399-AF14-5FC3B1F7BFBF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A017B904-A3C4-4070-96F7-9679FD2383C9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "7FCCC5B8-ED6E-4FCA-BA07-4D2AA1D26F50"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23BC31CA-2061-4141-8600-EF4A9AE7DD2A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "D43D904E-6B72-44B4-A158-D6A7C30504A3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1A43409-AF18-4BD5-A0D4-D27CDD6ABBE6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "AB35A114-99E7-44C6-B53B-B293AA9D9815"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56E2CAAD-8A4D-4F1A-AEF0-034C02965935"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "C37DFE8A-F733-48D3-8BF6-ECC98A476C54"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACA11FBB-1B4C-4F66-89EF-2D91C0161C4C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "DAD2CA81-44E6-4499-9F5C-502F060A3B8F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58CE9F4A-74BD-4AFC-B019-5D750E2D1E16"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "6E012434-72F0-4BD6-ACA4-DF7E12FB9033"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B64FEC33-D6D9-4F4C-BE43-31D637E6B01F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "F08FCBA2-94B8-44F9-921F-0CDD03D7903A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B1D3E7F-9C2F-48F8-BF49-539570A0986A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "3577400F-ADC8-4EBF-AFEE-DE165391BE12"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFC4885-AF94-471E-AE4E-DD26A6A91667"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "02EF4F49-FCB7-44C8-BC83-8A3519807338"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12B9705B-B21D-450B-A62B-933DC81A19E1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "B170FD2A-0422-4778-812F-EBCDF19A1253"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B786B2F4-6586-4E05-BDE9-DFDBA7BD3739"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "2CC4192B-D9F4-4886-BDDE-5859A89B6221"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEBA453E-67D9-4760-89A6-6CF8C632C6A4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "A64CD7F9-D8BB-4717-90B5-FBFE01B00CB5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5042C3C1-3964-437B-98C1-0458F73B7197"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "AB49899D-165E-4B57-A3F5-D6ADDD138E12"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD2B738-620D-42F8-881C-A6B293B724BA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "E032CC0E-0E19-490A-B3A2-5BA82DA52FC0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C46D12-6699-4BAC-AC47-7B150AECAF9B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "CE9621CA-4AC7-4BA5-940D-E76E795502A2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1139B205-02DA-4155-897C-F5D4191686A8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "BC0AB74D-DFDD-4B8F-9AFB-158E8C09A6F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C10BFD7F-0EDC-4CA0-9BEE-2CD0C83CAA05"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "EF765E11-57A1-444F-840B-321944679F4B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "518EE433-9E08-40FE-90F7-48E8AC934743"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "D4AD7C27-EFF5-4302-9B7F-0AFF190F1893"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1522EB30-AB31-47E3-B2EB-90CE231C284B"
}
]
}
]
}
],
"references": [
{
"url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2022-47525",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.600",
"lastModified": "2023-05-31T00:15:09.600",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Fox-IT DataDiode (aka Fox DataDiode) 3.4.3 suffers from a Divide-by-Zero vulnerability in the packet parser. A remote attacker could leverage this vulnerability to cause a denial-of-service. Exploitation of this issue does not require user interaction."
}
],
"metrics": {},
"references": [
{
"url": "https://www.fox-it.com/nl-en/fox-crypto/fox-datadiode/",
"source": "cve@mitre.org"
},
{
"url": "https://www.fox-it.com/nl-en/software-vulnerability-report/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2022-47526",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.647",
"lastModified": "2023-05-31T00:15:09.647",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Fox-IT DataDiode (aka Fox DataDiode) 3.4.3 suffers from a path traversal vulnerability with resultant arbitrary writing of files. A remote attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the downstream node user. Exploitation of this issue does not require user interaction."
}
],
"metrics": {},
"references": [
{
"url": "https://www.fox-it.com/nl-en/fox-crypto/fox-datadiode/",
"source": "cve@mitre.org"
},
{
"url": "https://www.fox-it.com/nl-en/software-vulnerability-report/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-23562",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T01:15:43.057",
"lastModified": "2023-05-31T01:15:43.057",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control that allows an authenticated user can update global parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://advisories.stormshield.eu",
"source": "cve@mitre.org"
},
{
"url": "https://advisories.stormshield.eu/2023-002/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,23 +2,83 @@
"id": "CVE-2023-26595",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:09.353",
"lastModified": "2023-05-23T13:04:34.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T00:18:47.900",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Denial-of-service (DoS) vulnerability in Message of Cybozu Garoon 4.10.0 to 5.9.2 allows a remote authenticated attacker to cause a denial of service condition."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10.0",
"versionEndIncluding": "5.9.2",
"matchCriteriaId": "3F182E21-51F6-4C84-8914-6DF1919A4478"
}
]
}
]
}
],
"references": [
{
"url": "https://cs.cybozu.co.jp/2023/007698.html",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jvn.jp/en/jp/JVN41694426/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2612",
"sourceIdentifier": "security@ubuntu.com",
"published": "2023-05-31T00:15:10.257",
"lastModified": "2023-05-31T00:15:10.257",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service (kernel deadlock)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@ubuntu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@ubuntu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"references": [
{
"url": "https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/kinetic/commit/?id=02b47547824b1cd0d55c6744f91886f04de8947e",
"source": "security@ubuntu.com"
},
{
"url": "https://ubuntu.com/security/CVE-2023-2612",
"source": "security@ubuntu.com"
}
]
}

View File

@ -2,23 +2,83 @@
"id": "CVE-2023-27304",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:09.397",
"lastModified": "2023-05-23T13:04:34.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T00:15:42.713",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Operation restriction bypass vulnerability in Message and Bulletin of Cybozu Garoon 4.6.0 to 5.9.2 allows a remote authenticated attacker to alter the data of Message and/or Bulletin."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.6.0",
"versionEndIncluding": "5.9.2",
"matchCriteriaId": "27D3DFBC-BF78-4542-9A30-DBAD59ECC223"
}
]
}
]
}
],
"references": [
{
"url": "https://cs.cybozu.co.jp/2023/007698.html",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jvn.jp/en/jp/JVN41694426/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-28344",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.697",
"lastModified": "2023-05-31T00:15:09.697",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Faronics Insight 10.0.19045 on Windows. The Insight Teacher Console application allows unauthenticated attackers to view constantly updated screenshots of student desktops and to submit falsified screenshots on behalf of students. Attackers are able to view screenshots of student desktops without their consent. These screenshots may potentially contain sensitive/personal data. Attackers can also rapidly submit falsified images, hiding the actual contents of student desktops from the Teacher Console."
}
],
"metrics": {},
"references": [
{
"url": "https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/",
"source": "cve@mitre.org"
},
{
"url": "https://research.nccgroup.com/?research=Technical%20advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-28345",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.747",
"lastModified": "2023-05-31T00:15:09.747",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Faronics Insight 10.0.19045 on Windows. The Insight Teacher Console application exposes the teacher's Console password in cleartext via an API endpoint accessible from localhost. Attackers with physical access to the Teacher Console can open a web browser, navigate to the affected endpoint and obtain the teacher's password. This enables them to log into the Teacher Console and begin trivially attacking student machines."
}
],
"metrics": {},
"references": [
{
"url": "https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/",
"source": "cve@mitre.org"
},
{
"url": "https://research.nccgroup.com/?research=Technical%20advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-28346",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.793",
"lastModified": "2023-05-31T00:15:09.793",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Faronics Insight 10.0.19045 on Windows. It is possible for a remote attacker to communicate with the private API endpoints exposed at /login, /consoleSettings, /console, etc. despite Virtual Host Routing being used to block this access. Remote attackers can interact with private pages on the web server, enabling them to perform privileged actions such as logging into the console and changing console settings if they have valid credentials."
}
],
"metrics": {},
"references": [
{
"url": "https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/",
"source": "cve@mitre.org"
},
{
"url": "https://research.nccgroup.com/?research=Technical%20advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-28347",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.840",
"lastModified": "2023-05-31T00:15:09.840",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Faronics Insight 10.0.19045 on Windows. It is possible for an attacker to create a proof-of-concept script that functions similarly to a Student Console, providing unauthenticated attackers with the ability to exploit XSS vulnerabilities within the Teacher Console application and achieve remote code execution as NT AUTHORITY/SYSTEM on all connected Student Consoles and the Teacher Console in a Zero Click manner."
}
],
"metrics": {},
"references": [
{
"url": "https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/",
"source": "cve@mitre.org"
},
{
"url": "https://research.nccgroup.com/?research=Technical%20advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-28348",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.887",
"lastModified": "2023-05-31T00:15:09.887",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Faronics Insight 10.0.19045 on Windows. A suitably positioned attacker could perform a man-in-the-middle attack on either a connected student or teacher, enabling them to intercept student keystrokes or modify executable files being sent from teachers to students."
}
],
"metrics": {},
"references": [
{
"url": "https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/",
"source": "cve@mitre.org"
},
{
"url": "https://research.nccgroup.com/?research=Technical%20advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-28349",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.933",
"lastModified": "2023-05-31T00:15:09.933",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Faronics Insight 10.0.19045 on Windows. It is possible for an attacker to create a crafted program that functions similarly to the Teacher Console. This can compel Student Consoles to connect and put themselves at risk automatically. Connected Student Consoles can be compelled to write arbitrary files to arbitrary locations on disk with NT AUTHORITY/SYSTEM level permissions, enabling remote code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/",
"source": "cve@mitre.org"
},
{
"url": "https://research.nccgroup.com/?research=Technical%20advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-28350",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.980",
"lastModified": "2023-05-31T00:15:09.980",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Faronics Insight 10.0.19045 on Windows. Attacker-supplied input is not validated/sanitized before being rendered in both the Teacher and Student Console applications, enabling an attacker to execute JavaScript in these applications. Due to the rich and highly privileged functionality offered by the Teacher Console, the ability to silently exploit Cross Site Scripting (XSS) on the Teacher Machine enables remote code execution on any connected student machine (and the teacher's machine)."
}
],
"metrics": {},
"references": [
{
"url": "https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/",
"source": "cve@mitre.org"
},
{
"url": "https://research.nccgroup.com/?research=Technical%20advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-28351",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:10.023",
"lastModified": "2023-05-31T00:15:10.023",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Faronics Insight 10.0.19045 on Windows. Every keystroke made by any user on a computer with the Student application installed is logged to a world-readable directory. A local attacker can trivially extract these cleartext keystrokes, potentially enabling them to obtain PII and/or to compromise personal accounts owned by the victim."
}
],
"metrics": {},
"references": [
{
"url": "https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/",
"source": "cve@mitre.org"
},
{
"url": "https://research.nccgroup.com/?research=Technical%20advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-28352",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:10.063",
"lastModified": "2023-05-31T00:15:10.063",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Faronics Insight 10.0.19045 on Windows. By abusing the Insight UDP broadcast discovery system, an attacker-controlled artificial Student Console can connect to and attack a Teacher Console even after Enhanced Security Mode has been enabled."
}
],
"metrics": {},
"references": [
{
"url": "https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/",
"source": "cve@mitre.org"
},
{
"url": "https://research.nccgroup.com/?research=Technical%20advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-28353",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:10.107",
"lastModified": "2023-05-31T00:15:10.107",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Faronics Insight 10.0.19045 on Windows. An unauthenticated attacker is able to upload any type of file to any location on the Teacher Console's computer, enabling a variety of different exploitation paths including code execution. It is also possible for the attacker to chain this vulnerability with others to cause a deployed DLL file to immediately execute as NT AUTHORITY/SYSTEM."
}
],
"metrics": {},
"references": [
{
"url": "https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/",
"source": "cve@mitre.org"
},
{
"url": "https://research.nccgroup.com/?research=Technical%20advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-29742",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:10.153",
"lastModified": "2023-05-31T00:15:10.153",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue found in BestWeather v.7.3.1 for Android allows unauthorized apps to cause a code execution attack by manipulating the database."
}
],
"metrics": {},
"references": [
{
"url": "http://www.zmtqsh.com/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29742/CVE%20detail.md",
"source": "cve@mitre.org"
},
{
"url": "https://play.google.com/store/apps/details?id=com.icoolme.android.weather",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-29745",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:10.200",
"lastModified": "2023-05-31T00:15:10.200",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue found in BestWeather v.7.3.1 for Android allows unauthorized apps to cause a persistent denial of service attack by manipulating the database."
}
],
"metrics": {},
"references": [
{
"url": "http://www.zmtqsh.com/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29745/CVE%20detail.md",
"source": "cve@mitre.org"
},
{
"url": "https://play.google.com/store/apps/details?id=com.TheThaiger.android",
"source": "cve@mitre.org"
},
{
"url": "https://play.google.com/store/apps/details?id=com.icoolme.android.weather",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2998",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-31T01:15:43.103",
"lastModified": "2023-05-31T01:15:43.103",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/thorsten/phpmyfaq/commit/c120070a66e6c497c328d3b6b067eebcd8ea8493",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/8282d78e-f399-4bf4-8403-f39103a31e78",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2999",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-31T01:15:43.163",
"lastModified": "2023-05-31T01:15:43.163",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/thorsten/phpmyfaq/commit/937913948cab382a38f681e0bd29c152e2f383cd",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/4d89c7cc-fb4c-4b64-9b67-f0189f70a620",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2023-30197",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T01:15:43.223",
"lastModified": "2023-05-31T01:15:43.223",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect Access Control in the module \"My inventory\" (myinventory) <= 1.6.6 from Webbax for PrestaShop, allows a guest to download personal information without restriction by performing a path traversal attack."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/05/30/myinventory.html",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/PrestaShop/PrestaShop/blob/6c05518b807d014ee8edb811041e3de232520c28/classes/Tools.php#L1247",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,15 +2,38 @@
"id": "CVE-2023-31206",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-22T14:15:09.583",
"lastModified": "2023-05-22T16:15:51.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T01:25:33.760",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.\u00a0Attackers can change the immutable name and type of nodes of InLong. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick [1] to solve it.\n\n [1] https://cveprocess.apache.org/cve5/[1]%C2%A0https://github.com/apache/inlong/pull/7891 https://github.com/apache/inlong/pull/7891 https://github.com/apache/inlong/pull/7891 \n\n"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
@ -23,10 +46,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.4.0",
"versionEndIncluding": "1.6.0",
"matchCriteriaId": "4A7AAC7B-2146-46D9-8FD9-DA2B5903BB6E"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/qb7zffo785wzpmsobjqcypodngw6kg6x",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-31670",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T01:15:09.917",
"lastModified": "2023-05-23T13:04:39.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T00:38:41.887",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue in wasm2c 1.0.32, wasm2wat 1.0.32, wasm-decompile 1.0.32, and wasm-validate 1.0.32 allows attackers to cause a Denial of Service (DoS) via running a crafted binary."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "AFE1D9C5-6B44-494E-9964-8B5A1374C154"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/WebAssembly/wabt/issues/2199",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,23 +2,95 @@
"id": "CVE-2023-31741",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T01:15:10.047",
"lastModified": "2023-05-23T13:04:34.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T00:26:35.690",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "There is a command injection vulnerability in the Linksys E2000 router with firmware version 1.0.06. If an attacker gains web management privileges, they can inject commands into the post request parameters wl_ssid, wl_ant, wl_rate, WL_atten_ctl, ttcp_num, ttcp_size in the httpd s Start_EPI() function, thereby gaining shell privileges."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linksys:e2000_firmware:1.0.06:*:*:*:*:*:*:*",
"matchCriteriaId": "FE947E51-AD41-462E-B0B6-69A21F7D670A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:linksys:e2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8052B407-172A-4A6B-983C-074F0FD1F8DB"
}
]
}
]
}
],
"references": [
{
"url": "http://linksys.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31741/Linksys_E2000_RCE_2.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,83 @@
"id": "CVE-2023-31748",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T15:15:09.490",
"lastModified": "2023-05-25T12:40:42.083",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T00:34:02.457",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in MobileTrans v4.0.11 allows attackers to escalate privileges to local admin via replacing the executable file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wondershare:mobiletrans:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7C27458A-A20D-4446-AB30-6D6F47E947CC"
}
]
}
]
}
],
"references": [
{
"url": "http://mobiletrans.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://packetstormsecurity.com/files/172466/MobileTrans-4.0.11-Weak-Service-Permissions.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-31861",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-25T02:15:08.820",
"lastModified": "2023-05-25T12:40:12.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T01:17:11.800",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ZLMediaKit 4.0 is vulnerable to Directory Traversal."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zlmediakit_project:zlmediakit:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B091A997-53BD-4CF6-B9EA-AE8040EA3038"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/nbb651/5aa72867fc1df3ef52e690b293964aac",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/nbb651/CVE-ZLMediaKit/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,27 +2,93 @@
"id": "CVE-2023-33829",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T21:15:11.567",
"lastModified": "2023-05-26T17:15:19.063",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T01:05:43.620",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in Cloudogu GmbH SCM Manager v1.2 to v1.60 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description text field."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudogu:scm_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2",
"versionEndIncluding": "1.60",
"matchCriteriaId": "8F354A29-B1EA-417C-A14F-BACBEF562647"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/172588/SCM-Manager-1.60-Cross-Site-Scripting.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bitbucket.org/sdorra/docker-scm-manager/src/master/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/n3gox/Stored-XSS-on-SCM-Manager-1.60",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-30T23:55:24.255613+00:00
2023-05-31T02:00:26.345283+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-30T23:38:54.593000+00:00
2023-05-31T01:43:24.730000+00:00
```
### Last Data Feed Release
@ -23,57 +23,63 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2023-05-30T00:00:13.573420+00:00
2023-05-31T00:00:13.597108+00:00
```
### Total Number of included CVEs
```plain
216447
216468
```
### CVEs added in the last Commit
Recently added CVEs: `35`
Recently added CVEs: `21`
* [CVE-2023-2936](CVE-2023/CVE-2023-29xx/CVE-2023-2936.json) (`2023-05-30T22:15:10.350`)
* [CVE-2023-2937](CVE-2023/CVE-2023-29xx/CVE-2023-2937.json) (`2023-05-30T22:15:10.393`)
* [CVE-2023-2938](CVE-2023/CVE-2023-29xx/CVE-2023-2938.json) (`2023-05-30T22:15:10.433`)
* [CVE-2023-2939](CVE-2023/CVE-2023-29xx/CVE-2023-2939.json) (`2023-05-30T22:15:10.477`)
* [CVE-2023-2940](CVE-2023/CVE-2023-29xx/CVE-2023-2940.json) (`2023-05-30T22:15:10.527`)
* [CVE-2023-2941](CVE-2023/CVE-2023-29xx/CVE-2023-2941.json) (`2023-05-30T22:15:10.570`)
* [CVE-2023-2953](CVE-2023/CVE-2023-29xx/CVE-2023-2953.json) (`2023-05-30T22:15:10.613`)
* [CVE-2023-32342](CVE-2023/CVE-2023-323xx/CVE-2023-32342.json) (`2023-05-30T22:15:10.677`)
* [CVE-2023-33734](CVE-2023/CVE-2023-337xx/CVE-2023-33734.json) (`2023-05-30T22:15:10.737`)
* [CVE-2023-33740](CVE-2023/CVE-2023-337xx/CVE-2023-33740.json) (`2023-05-30T22:15:10.777`)
* [CVE-2023-33741](CVE-2023/CVE-2023-337xx/CVE-2023-33741.json) (`2023-05-30T22:15:10.820`)
* [CVE-2023-33961](CVE-2023/CVE-2023-339xx/CVE-2023-33961.json) (`2023-05-30T22:15:10.863`)
* [CVE-2023-33962](CVE-2023/CVE-2023-339xx/CVE-2023-33962.json) (`2023-05-30T22:15:10.933`)
* [CVE-2023-34151](CVE-2023/CVE-2023-341xx/CVE-2023-34151.json) (`2023-05-30T22:15:11.000`)
* [CVE-2023-34152](CVE-2023/CVE-2023-341xx/CVE-2023-34152.json) (`2023-05-30T22:15:11.070`)
* [CVE-2023-34153](CVE-2023/CVE-2023-341xx/CVE-2023-34153.json) (`2023-05-30T22:15:11.143`)
* [CVE-2023-29726](CVE-2023/CVE-2023-297xx/CVE-2023-29726.json) (`2023-05-30T23:15:09.513`)
* [CVE-2023-29727](CVE-2023/CVE-2023-297xx/CVE-2023-29727.json) (`2023-05-30T23:15:09.563`)
* [CVE-2023-29728](CVE-2023/CVE-2023-297xx/CVE-2023-29728.json) (`2023-05-30T23:15:09.607`)
* [CVE-2023-29738](CVE-2023/CVE-2023-297xx/CVE-2023-29738.json) (`2023-05-30T23:15:09.653`)
* [CVE-2023-29739](CVE-2023/CVE-2023-297xx/CVE-2023-29739.json) (`2023-05-30T23:15:09.700`)
* [CVE-2023-29740](CVE-2023/CVE-2023-297xx/CVE-2023-29740.json) (`2023-05-30T23:15:09.750`)
* [CVE-2023-29741](CVE-2023/CVE-2023-297xx/CVE-2023-29741.json) (`2023-05-30T23:15:09.793`)
* [CVE-2023-29743](CVE-2023/CVE-2023-297xx/CVE-2023-29743.json) (`2023-05-30T23:15:09.840`)
* [CVE-2023-2952](CVE-2023/CVE-2023-29xx/CVE-2023-2952.json) (`2023-05-30T23:15:09.887`)
* [CVE-2012-10015](CVE-2012/CVE-2012-100xx/CVE-2012-10015.json) (`2023-05-31T00:15:09.417`)
* [CVE-2021-31233](CVE-2021/CVE-2021-312xx/CVE-2021-31233.json) (`2023-05-31T01:15:42.983`)
* [CVE-2022-47525](CVE-2022/CVE-2022-475xx/CVE-2022-47525.json) (`2023-05-31T00:15:09.600`)
* [CVE-2022-47526](CVE-2022/CVE-2022-475xx/CVE-2022-47526.json) (`2023-05-31T00:15:09.647`)
* [CVE-2023-28344](CVE-2023/CVE-2023-283xx/CVE-2023-28344.json) (`2023-05-31T00:15:09.697`)
* [CVE-2023-28345](CVE-2023/CVE-2023-283xx/CVE-2023-28345.json) (`2023-05-31T00:15:09.747`)
* [CVE-2023-28346](CVE-2023/CVE-2023-283xx/CVE-2023-28346.json) (`2023-05-31T00:15:09.793`)
* [CVE-2023-28347](CVE-2023/CVE-2023-283xx/CVE-2023-28347.json) (`2023-05-31T00:15:09.840`)
* [CVE-2023-28348](CVE-2023/CVE-2023-283xx/CVE-2023-28348.json) (`2023-05-31T00:15:09.887`)
* [CVE-2023-28349](CVE-2023/CVE-2023-283xx/CVE-2023-28349.json) (`2023-05-31T00:15:09.933`)
* [CVE-2023-28350](CVE-2023/CVE-2023-283xx/CVE-2023-28350.json) (`2023-05-31T00:15:09.980`)
* [CVE-2023-28351](CVE-2023/CVE-2023-283xx/CVE-2023-28351.json) (`2023-05-31T00:15:10.023`)
* [CVE-2023-28352](CVE-2023/CVE-2023-283xx/CVE-2023-28352.json) (`2023-05-31T00:15:10.063`)
* [CVE-2023-28353](CVE-2023/CVE-2023-283xx/CVE-2023-28353.json) (`2023-05-31T00:15:10.107`)
* [CVE-2023-29742](CVE-2023/CVE-2023-297xx/CVE-2023-29742.json) (`2023-05-31T00:15:10.153`)
* [CVE-2023-29745](CVE-2023/CVE-2023-297xx/CVE-2023-29745.json) (`2023-05-31T00:15:10.200`)
* [CVE-2023-2612](CVE-2023/CVE-2023-26xx/CVE-2023-2612.json) (`2023-05-31T00:15:10.257`)
* [CVE-2023-23562](CVE-2023/CVE-2023-235xx/CVE-2023-23562.json) (`2023-05-31T01:15:43.057`)
* [CVE-2023-2998](CVE-2023/CVE-2023-29xx/CVE-2023-2998.json) (`2023-05-31T01:15:43.103`)
* [CVE-2023-2999](CVE-2023/CVE-2023-29xx/CVE-2023-2999.json) (`2023-05-31T01:15:43.163`)
* [CVE-2023-30197](CVE-2023/CVE-2023-301xx/CVE-2023-30197.json) (`2023-05-31T01:15:43.223`)
### CVEs modified in the last Commit
Recently modified CVEs: `7`
Recently modified CVEs: `17`
* [CVE-2022-47178](CVE-2022/CVE-2022-471xx/CVE-2022-47178.json) (`2023-05-30T23:38:54.593`)
* [CVE-2023-0779](CVE-2023/CVE-2023-07xx/CVE-2023-0779.json) (`2023-05-30T22:15:09.457`)
* [CVE-2023-27384](CVE-2023/CVE-2023-273xx/CVE-2023-27384.json) (`2023-05-30T22:18:42.337`)
* [CVE-2023-25953](CVE-2023/CVE-2023-259xx/CVE-2023-25953.json) (`2023-05-30T22:18:54.947`)
* [CVE-2023-25946](CVE-2023/CVE-2023-259xx/CVE-2023-25946.json) (`2023-05-30T22:20:58.580`)
* [CVE-2023-23545](CVE-2023/CVE-2023-235xx/CVE-2023-23545.json) (`2023-05-30T22:21:23.440`)
* [CVE-2023-22654](CVE-2023/CVE-2023-226xx/CVE-2023-22654.json) (`2023-05-30T22:22:43.403`)
* [CVE-2022-47136](CVE-2022/CVE-2022-471xx/CVE-2022-47136.json) (`2023-05-31T00:22:02.713`)
* [CVE-2022-45364](CVE-2022/CVE-2022-453xx/CVE-2022-45364.json) (`2023-05-31T00:46:51.457`)
* [CVE-2022-46794](CVE-2022/CVE-2022-467xx/CVE-2022-46794.json) (`2023-05-31T00:49:12.070`)
* [CVE-2022-46816](CVE-2022/CVE-2022-468xx/CVE-2022-46816.json) (`2023-05-31T00:52:43.880`)
* [CVE-2022-47152](CVE-2022/CVE-2022-471xx/CVE-2022-47152.json) (`2023-05-31T00:56:36.890`)
* [CVE-2022-47180](CVE-2022/CVE-2022-471xx/CVE-2022-47180.json) (`2023-05-31T00:59:02.133`)
* [CVE-2022-47320](CVE-2022/CVE-2022-473xx/CVE-2022-47320.json) (`2023-05-31T01:35:19.820`)
* [CVE-2022-46738](CVE-2022/CVE-2022-467xx/CVE-2022-46738.json) (`2023-05-31T01:43:24.730`)
* [CVE-2023-27304](CVE-2023/CVE-2023-273xx/CVE-2023-27304.json) (`2023-05-31T00:15:42.713`)
* [CVE-2023-26595](CVE-2023/CVE-2023-265xx/CVE-2023-26595.json) (`2023-05-31T00:18:47.900`)
* [CVE-2023-31741](CVE-2023/CVE-2023-317xx/CVE-2023-31741.json) (`2023-05-31T00:26:35.690`)
* [CVE-2023-31996](CVE-2023/CVE-2023-319xx/CVE-2023-31996.json) (`2023-05-31T00:29:23.163`)
* [CVE-2023-31748](CVE-2023/CVE-2023-317xx/CVE-2023-31748.json) (`2023-05-31T00:34:02.457`)
* [CVE-2023-31670](CVE-2023/CVE-2023-316xx/CVE-2023-31670.json) (`2023-05-31T00:38:41.887`)
* [CVE-2023-33829](CVE-2023/CVE-2023-338xx/CVE-2023-33829.json) (`2023-05-31T01:05:43.620`)
* [CVE-2023-31861](CVE-2023/CVE-2023-318xx/CVE-2023-31861.json) (`2023-05-31T01:17:11.800`)
* [CVE-2023-31206](CVE-2023/CVE-2023-312xx/CVE-2023-31206.json) (`2023-05-31T01:25:33.760`)
## Download and Usage