From edd5b3c7abf6647b63dafcfe5f525983c96ae868 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 18 Jul 2023 14:00:51 +0000 Subject: [PATCH] Auto-Update: 2023-07-18T14:00:47.612665+00:00 --- CVE-2015/CVE-2015-101xx/CVE-2015-10122.json | 4 +- CVE-2018/CVE-2018-250xx/CVE-2018-25088.json | 92 ++++++++++++++++ CVE-2020/CVE-2020-366xx/CVE-2020-36695.json | 4 +- CVE-2021/CVE-2021-346xx/CVE-2021-34619.json | 6 +- CVE-2021/CVE-2021-369xx/CVE-2021-36908.json | 25 ++--- CVE-2021/CVE-2021-373xx/CVE-2021-37384.json | 4 +- CVE-2021/CVE-2021-415xx/CVE-2021-41564.json | 4 +- CVE-2021/CVE-2021-415xx/CVE-2021-41571.json | 10 +- CVE-2021/CVE-2021-425xx/CVE-2021-42522.json | 4 +- CVE-2021/CVE-2021-42xx/CVE-2021-4204.json | 10 +- CVE-2021/CVE-2021-42xx/CVE-2021-4240.json | 14 ++- CVE-2021/CVE-2021-42xx/CVE-2021-4241.json | 14 ++- CVE-2021/CVE-2021-42xx/CVE-2021-4287.json | 14 ++- CVE-2021/CVE-2021-430xx/CVE-2021-43072.json | 4 +- CVE-2021/CVE-2021-433xx/CVE-2021-43306.json | 4 +- CVE-2021/CVE-2021-433xx/CVE-2021-43307.json | 4 +- CVE-2021/CVE-2021-433xx/CVE-2021-43308.json | 4 +- CVE-2021/CVE-2021-433xx/CVE-2021-43309.json | 4 +- CVE-2022/CVE-2022-272xx/CVE-2022-27218.json | 4 +- CVE-2022/CVE-2022-272xx/CVE-2022-27221.json | 4 +- CVE-2022/CVE-2022-274xx/CVE-2022-27480.json | 4 +- CVE-2022/CVE-2022-275xx/CVE-2022-27511.json | 4 +- CVE-2022/CVE-2022-275xx/CVE-2022-27549.json | 4 +- CVE-2022/CVE-2022-275xx/CVE-2022-27575.json | 4 +- CVE-2022/CVE-2022-277xx/CVE-2022-27779.json | 4 +- CVE-2022/CVE-2022-278xx/CVE-2022-27891.json | 4 +- CVE-2022/CVE-2022-27xx/CVE-2022-2732.json | 14 ++- CVE-2022/CVE-2022-281xx/CVE-2022-28135.json | 4 +- CVE-2022/CVE-2022-308xx/CVE-2022-30858.json | 4 +- CVE-2022/CVE-2022-41xx/CVE-2022-4146.json | 4 +- CVE-2022/CVE-2022-458xx/CVE-2022-45828.json | 55 ++++++++++ CVE-2022/CVE-2022-468xx/CVE-2022-46857.json | 55 ++++++++++ CVE-2022/CVE-2022-471xx/CVE-2022-47169.json | 55 ++++++++++ CVE-2023/CVE-2023-236xx/CVE-2023-23660.json | 59 +++++++++++ CVE-2023/CVE-2023-24xx/CVE-2023-2433.json | 4 +- CVE-2023/CVE-2023-250xx/CVE-2023-25036.json | 55 ++++++++++ CVE-2023/CVE-2023-254xx/CVE-2023-25473.json | 55 ++++++++++ CVE-2023/CVE-2023-254xx/CVE-2023-25475.json | 55 ++++++++++ CVE-2023/CVE-2023-254xx/CVE-2023-25482.json | 55 ++++++++++ CVE-2023/CVE-2023-288xx/CVE-2023-28864.json | 4 +- CVE-2023/CVE-2023-319xx/CVE-2023-31998.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34142.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34143.json | 4 +- CVE-2023/CVE-2023-344xx/CVE-2023-34432.json | 96 ++++++++++++++++- CVE-2023/CVE-2023-34xx/CVE-2023-3403.json | 4 +- CVE-2023/CVE-2023-34xx/CVE-2023-3459.json | 4 +- CVE-2023/CVE-2023-353xx/CVE-2023-35352.json | 59 ++++++++++- CVE-2023/CVE-2023-353xx/CVE-2023-35353.json | 85 ++++++++++++++- CVE-2023/CVE-2023-353xx/CVE-2023-35356.json | 85 ++++++++++++++- CVE-2023/CVE-2023-353xx/CVE-2023-35357.json | 85 ++++++++++++++- CVE-2023/CVE-2023-353xx/CVE-2023-35358.json | 85 ++++++++++++++- CVE-2023/CVE-2023-353xx/CVE-2023-35360.json | 101 +++++++++++++++++- CVE-2023/CVE-2023-353xx/CVE-2023-35361.json | 101 +++++++++++++++++- CVE-2023/CVE-2023-353xx/CVE-2023-35362.json | 101 +++++++++++++++++- CVE-2023/CVE-2023-353xx/CVE-2023-35363.json | 74 ++++++++++++- CVE-2023/CVE-2023-353xx/CVE-2023-35364.json | 74 ++++++++++++- CVE-2023/CVE-2023-353xx/CVE-2023-35365.json | 111 +++++++++++++++++++- CVE-2023/CVE-2023-368xx/CVE-2023-36825.json | 4 +- CVE-2023/CVE-2023-36xx/CVE-2023-3607.json | 64 ++++++++++- CVE-2023/CVE-2023-36xx/CVE-2023-3608.json | 72 ++++++++++++- CVE-2023/CVE-2023-371xx/CVE-2023-37153.json | 69 +++++++++++- CVE-2023/CVE-2023-372xx/CVE-2023-37265.json | 4 +- CVE-2023/CVE-2023-372xx/CVE-2023-37266.json | 4 +- CVE-2023/CVE-2023-373xx/CVE-2023-37386.json | 55 ++++++++++ CVE-2023/CVE-2023-373xx/CVE-2023-37387.json | 55 ++++++++++ CVE-2023/CVE-2023-374xx/CVE-2023-37461.json | 4 +- CVE-2023/CVE-2023-374xx/CVE-2023-37476.json | 4 +- CVE-2023/CVE-2023-374xx/CVE-2023-37479.json | 4 +- CVE-2023/CVE-2023-377xx/CVE-2023-37769.json | 4 +- CVE-2023/CVE-2023-377xx/CVE-2023-37770.json | 4 +- CVE-2023/CVE-2023-377xx/CVE-2023-37781.json | 4 +- CVE-2023/CVE-2023-377xx/CVE-2023-37791.json | 4 +- CVE-2023/CVE-2023-378xx/CVE-2023-37889.json | 55 ++++++++++ CVE-2023/CVE-2023-378xx/CVE-2023-37892.json | 55 ++++++++++ CVE-2023/CVE-2023-379xx/CVE-2023-37973.json | 55 ++++++++++ CVE-2023/CVE-2023-37xx/CVE-2023-3708.json | 4 +- CVE-2023/CVE-2023-37xx/CVE-2023-3709.json | 4 +- CVE-2023/CVE-2023-37xx/CVE-2023-3713.json | 4 +- CVE-2023/CVE-2023-37xx/CVE-2023-3714.json | 4 +- CVE-2023/CVE-2023-37xx/CVE-2023-3724.json | 4 +- CVE-2023/CVE-2023-37xx/CVE-2023-3743.json | 55 ++++++++++ CVE-2023/CVE-2023-383xx/CVE-2023-38326.json | 15 +++ CVE-2023/CVE-2023-384xx/CVE-2023-38403.json | 4 +- CVE-2023/CVE-2023-384xx/CVE-2023-38404.json | 4 +- CVE-2023/CVE-2023-384xx/CVE-2023-38405.json | 4 +- CVE-2023/CVE-2023-384xx/CVE-2023-38409.json | 4 +- CVE-2023/CVE-2023-384xx/CVE-2023-38426.json | 4 +- CVE-2023/CVE-2023-384xx/CVE-2023-38427.json | 4 +- CVE-2023/CVE-2023-384xx/CVE-2023-38428.json | 4 +- CVE-2023/CVE-2023-384xx/CVE-2023-38429.json | 4 +- CVE-2023/CVE-2023-384xx/CVE-2023-38430.json | 4 +- CVE-2023/CVE-2023-384xx/CVE-2023-38431.json | 4 +- CVE-2023/CVE-2023-384xx/CVE-2023-38432.json | 4 +- CVE-2023/CVE-2023-384xx/CVE-2023-38434.json | 4 +- README.md | 55 ++++++++-- 95 files changed, 2315 insertions(+), 210 deletions(-) create mode 100644 CVE-2018/CVE-2018-250xx/CVE-2018-25088.json create mode 100644 CVE-2022/CVE-2022-458xx/CVE-2022-45828.json create mode 100644 CVE-2022/CVE-2022-468xx/CVE-2022-46857.json create mode 100644 CVE-2022/CVE-2022-471xx/CVE-2022-47169.json create mode 100644 CVE-2023/CVE-2023-236xx/CVE-2023-23660.json create mode 100644 CVE-2023/CVE-2023-250xx/CVE-2023-25036.json create mode 100644 CVE-2023/CVE-2023-254xx/CVE-2023-25473.json create mode 100644 CVE-2023/CVE-2023-254xx/CVE-2023-25475.json create mode 100644 CVE-2023/CVE-2023-254xx/CVE-2023-25482.json create mode 100644 CVE-2023/CVE-2023-373xx/CVE-2023-37386.json create mode 100644 CVE-2023/CVE-2023-373xx/CVE-2023-37387.json create mode 100644 CVE-2023/CVE-2023-378xx/CVE-2023-37889.json create mode 100644 CVE-2023/CVE-2023-378xx/CVE-2023-37892.json create mode 100644 CVE-2023/CVE-2023-379xx/CVE-2023-37973.json create mode 100644 CVE-2023/CVE-2023-37xx/CVE-2023-3743.json create mode 100644 CVE-2023/CVE-2023-383xx/CVE-2023-38326.json diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10122.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10122.json index d030989d674..f177a097f21 100644 --- a/CVE-2015/CVE-2015-101xx/CVE-2015-10122.json +++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10122.json @@ -2,8 +2,8 @@ "id": "CVE-2015-10122", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-18T05:15:09.603", - "lastModified": "2023-07-18T05:15:09.603", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25088.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25088.json new file mode 100644 index 00000000000..0e2cece691a --- /dev/null +++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25088.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2018-25088", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-07-18T13:15:11.187", + "lastModified": "2023-07-18T13:15:11.187", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Blue Yonder postgraas_server up to 2.0.0b2. Affected is the function _create_pg_connection/create_postgres_db of the file postgraas_server/backends/postgres_cluster/postgres_cluster_driver.py of the component PostgreSQL Backend Handler. The manipulation leads to sql injection. Upgrading to version 2.0.0 is able to address this issue. The patch is identified as 7cd8d016edc74a78af0d81c948bfafbcc93c937c. It is recommended to upgrade the affected component. VDB-234246 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.2 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/blue-yonder/postgraas_server/commit/7cd8d016edc74a78af0d81c948bfafbcc93c937c", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/blue-yonder/postgraas_server/releases/tag/v2.0.0", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.234246", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.234246", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36695.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36695.json index d2b4c1525f7..0189130d55d 100644 --- a/CVE-2020/CVE-2020-366xx/CVE-2020-36695.json +++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36695.json @@ -2,8 +2,8 @@ "id": "CVE-2020-36695", "sourceIdentifier": "hirt@hitachi.co.jp", "published": "2023-07-18T03:15:52.963", - "lastModified": "2023-07-18T03:15:52.963", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-346xx/CVE-2021-34619.json b/CVE-2021/CVE-2021-346xx/CVE-2021-34619.json index c46ce4d2d42..c4902f6b95b 100644 --- a/CVE-2021/CVE-2021-346xx/CVE-2021-34619.json +++ b/CVE-2021/CVE-2021-346xx/CVE-2021-34619.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34619", "sourceIdentifier": "security@wordfence.com", "published": "2021-07-21T15:16:20.503", - "lastModified": "2021-07-29T17:36:01.040", + "lastModified": "2023-07-18T12:34:01.287", "vulnStatus": "Analyzed", "descriptions": [ { @@ -118,9 +118,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:storeapps:woocommerce_stock_manager:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:storeapps:stock_manager_for_woocommerce:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "2.5.7", - "matchCriteriaId": "9B74A371-3309-40DB-A701-2BB4AF27421F" + "matchCriteriaId": "0EB659B6-D7D5-4C6E-AFB4-5D87DEB73CD3" } ] } diff --git a/CVE-2021/CVE-2021-369xx/CVE-2021-36908.json b/CVE-2021/CVE-2021-369xx/CVE-2021-36908.json index dc6074929b6..a4f6ec5d0f7 100644 --- a/CVE-2021/CVE-2021-369xx/CVE-2021-36908.json +++ b/CVE-2021/CVE-2021-369xx/CVE-2021-36908.json @@ -2,12 +2,12 @@ "id": "CVE-2021-36908", "sourceIdentifier": "audit@patchstack.com", "published": "2021-11-18T15:15:09.627", - "lastModified": "2021-11-19T21:56:21.913", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-18T13:15:11.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Cross-Site Request Forgery (CSRF) vulnerability leading to Database Reset in WordPress WP Reset PRO Premium plugin (versions <= 5.98) allows attackers to trick authenticated into making unintentional database reset." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WebFactory Ltd. WP Reset PRO plugin <=\u00a05.98 versions." }, { "lang": "es", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "audit@patchstack.com", "type": "Primary", "description": [ { @@ -95,7 +95,7 @@ ] }, { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { @@ -125,11 +125,8 @@ ], "references": [ { - "url": "https://patchstack.com/database/vulnerability/wp-reset/wordpress-wp-reset-pro-premium-plugin-5-98-cross-site-request-forgery-csrf-vulnerability-leading-to-database-reset", - "source": "audit@patchstack.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://patchstack.com/database/vulnerability/wp-reset/wordpress-wp-reset-pro-premium-plugin-5-98-cross-site-request-forgery-csrf-vulnerability-leading-to-database-reset?_s_id=cve", + "source": "audit@patchstack.com" }, { "url": "https://patchstack.com/wp-reset-pro-critical-vulnerability-fixed/", @@ -138,14 +135,6 @@ "Exploit", "Third Party Advisory" ] - }, - { - "url": "https://wpreset.com/changelog/", - "source": "audit@patchstack.com", - "tags": [ - "Release Notes", - "Vendor Advisory" - ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-373xx/CVE-2021-37384.json b/CVE-2021/CVE-2021-373xx/CVE-2021-37384.json index 1b7669b1af7..6e121f3b26a 100644 --- a/CVE-2021/CVE-2021-373xx/CVE-2021-37384.json +++ b/CVE-2021/CVE-2021-373xx/CVE-2021-37384.json @@ -2,8 +2,8 @@ "id": "CVE-2021-37384", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T21:15:09.307", - "lastModified": "2023-07-17T21:15:09.307", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-415xx/CVE-2021-41564.json b/CVE-2021/CVE-2021-415xx/CVE-2021-41564.json index ea6d7d3d446..c837196c5cc 100644 --- a/CVE-2021/CVE-2021-415xx/CVE-2021-41564.json +++ b/CVE-2021/CVE-2021-415xx/CVE-2021-41564.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41564", "sourceIdentifier": "twcert@cert.org.tw", "published": "2021-10-08T16:15:07.827", - "lastModified": "2021-10-15T15:13:35.703", + "lastModified": "2023-07-18T13:55:04.143", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2021/CVE-2021-415xx/CVE-2021-41571.json b/CVE-2021/CVE-2021-415xx/CVE-2021-41571.json index 0dc308abfef..8145746582f 100644 --- a/CVE-2021/CVE-2021-415xx/CVE-2021-41571.json +++ b/CVE-2021/CVE-2021-415xx/CVE-2021-41571.json @@ -2,8 +2,8 @@ "id": "CVE-2021-41571", "sourceIdentifier": "security@apache.org", "published": "2022-02-01T13:15:09.663", - "lastModified": "2023-07-17T15:18:22.543", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-18T12:15:11.687", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -65,7 +65,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security@apache.org", "type": "Primary", "description": [ { @@ -75,12 +75,12 @@ ] }, { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-863" } ] } diff --git a/CVE-2021/CVE-2021-425xx/CVE-2021-42522.json b/CVE-2021/CVE-2021-425xx/CVE-2021-42522.json index c4d42a05d5b..ee3df563e40 100644 --- a/CVE-2021/CVE-2021-425xx/CVE-2021-42522.json +++ b/CVE-2021/CVE-2021-425xx/CVE-2021-42522.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42522", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2022-08-25T18:15:09.203", - "lastModified": "2022-12-21T15:01:19.963", + "lastModified": "2023-07-18T13:51:59.303", "vulnStatus": "Analyzed", "descriptions": [ { @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-401" } ] }, diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4204.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4204.json index ee5ec523df6..0716ca08e1c 100644 --- a/CVE-2021/CVE-2021-42xx/CVE-2021-4204.json +++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4204.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4204", "sourceIdentifier": "secalert@redhat.com", "published": "2022-08-24T16:15:09.873", - "lastModified": "2023-03-01T16:27:44.453", + "lastModified": "2023-07-18T13:52:35.333", "vulnStatus": "Analyzed", "descriptions": [ { @@ -40,22 +40,22 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-119" } ] }, { - "source": "nvd@nist.gov", + "source": "secalert@redhat.com", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-787" + "value": "CWE-20" } ] } diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4240.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4240.json index f8d8da76e19..0fc84ad5efe 100644 --- a/CVE-2021/CVE-2021-42xx/CVE-2021-4240.json +++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4240.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4240", "sourceIdentifier": "cna@vuldb.com", "published": "2022-11-15T23:15:10.233", - "lastModified": "2022-11-18T19:51:51.210", + "lastModified": "2023-07-18T13:52:21.237", "vulnStatus": "Analyzed", "descriptions": [ { @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4241.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4241.json index d8154ae8500..205e8014af9 100644 --- a/CVE-2021/CVE-2021-42xx/CVE-2021-4241.json +++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4241.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4241", "sourceIdentifier": "cna@vuldb.com", "published": "2022-11-15T23:15:14.737", - "lastModified": "2022-11-18T19:57:48.090", + "lastModified": "2023-07-18T13:52:11.470", "vulnStatus": "Analyzed", "descriptions": [ { @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4287.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4287.json index dbe04fd26e6..04372a0ba94 100644 --- a/CVE-2021/CVE-2021-42xx/CVE-2021-4287.json +++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4287.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4287", "sourceIdentifier": "cna@vuldb.com", "published": "2022-12-27T11:15:10.640", - "lastModified": "2023-01-18T14:11:31.037", + "lastModified": "2023-07-18T13:52:56.443", "vulnStatus": "Analyzed", "descriptions": [ { @@ -58,8 +58,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-430xx/CVE-2021-43072.json b/CVE-2021/CVE-2021-430xx/CVE-2021-43072.json index c6154a4a6c2..a04a49d95a4 100644 --- a/CVE-2021/CVE-2021-430xx/CVE-2021-43072.json +++ b/CVE-2021/CVE-2021-430xx/CVE-2021-43072.json @@ -2,8 +2,8 @@ "id": "CVE-2021-43072", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-07-18T03:15:54.947", - "lastModified": "2023-07-18T03:15:54.947", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-433xx/CVE-2021-43306.json b/CVE-2021/CVE-2021-433xx/CVE-2021-43306.json index aa1da888983..1b2cfcba272 100644 --- a/CVE-2021/CVE-2021-433xx/CVE-2021-43306.json +++ b/CVE-2021/CVE-2021-433xx/CVE-2021-43306.json @@ -2,7 +2,7 @@ "id": "CVE-2021-43306", "sourceIdentifier": "reefs@jfrog.com", "published": "2022-06-02T14:15:30.923", - "lastModified": "2022-06-09T17:56:56.883", + "lastModified": "2023-07-18T13:53:25.057", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-1333" } ] }, diff --git a/CVE-2021/CVE-2021-433xx/CVE-2021-43307.json b/CVE-2021/CVE-2021-433xx/CVE-2021-43307.json index a3076e0e2e3..d559eeefa85 100644 --- a/CVE-2021/CVE-2021-433xx/CVE-2021-43307.json +++ b/CVE-2021/CVE-2021-433xx/CVE-2021-43307.json @@ -2,7 +2,7 @@ "id": "CVE-2021-43307", "sourceIdentifier": "reefs@jfrog.com", "published": "2022-06-02T14:15:30.987", - "lastModified": "2022-06-09T18:39:59.997", + "lastModified": "2023-07-18T13:53:19.207", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-1333" } ] }, diff --git a/CVE-2021/CVE-2021-433xx/CVE-2021-43308.json b/CVE-2021/CVE-2021-433xx/CVE-2021-43308.json index f0c6271f64c..d709e9dc8cc 100644 --- a/CVE-2021/CVE-2021-433xx/CVE-2021-43308.json +++ b/CVE-2021/CVE-2021-433xx/CVE-2021-43308.json @@ -2,7 +2,7 @@ "id": "CVE-2021-43308", "sourceIdentifier": "reefs@jfrog.com", "published": "2022-06-02T14:15:31.047", - "lastModified": "2022-06-09T18:41:26.940", + "lastModified": "2023-07-18T13:53:11.403", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-1333" } ] }, diff --git a/CVE-2021/CVE-2021-433xx/CVE-2021-43309.json b/CVE-2021/CVE-2021-433xx/CVE-2021-43309.json index 52b3af39008..534a2a65a93 100644 --- a/CVE-2021/CVE-2021-433xx/CVE-2021-43309.json +++ b/CVE-2021/CVE-2021-433xx/CVE-2021-43309.json @@ -2,7 +2,7 @@ "id": "CVE-2021-43309", "sourceIdentifier": "reefs@jfrog.com", "published": "2022-08-24T16:15:09.137", - "lastModified": "2022-08-29T01:05:15.307", + "lastModified": "2023-07-18T13:53:03.970", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-697" + "value": "CWE-1333" } ] }, diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27218.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27218.json index 03422bd7dc4..324cad58379 100644 --- a/CVE-2022/CVE-2022-272xx/CVE-2022-27218.json +++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27218.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27218", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-15T17:15:12.877", - "lastModified": "2022-03-25T13:57:41.423", + "lastModified": "2023-07-18T13:53:44.023", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-522" } ] }, diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27221.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27221.json index cecd2784990..31847387d9a 100644 --- a/CVE-2022/CVE-2022-272xx/CVE-2022-27221.json +++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27221.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27221", "sourceIdentifier": "productcert@siemens.com", "published": "2022-06-14T10:15:20.057", - "lastModified": "2022-06-22T16:53:11.837", + "lastModified": "2023-07-18T13:53:31.627", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-331" + "value": "CWE-203" } ] }, diff --git a/CVE-2022/CVE-2022-274xx/CVE-2022-27480.json b/CVE-2022/CVE-2022-274xx/CVE-2022-27480.json index e005206f54a..c3b690222b0 100644 --- a/CVE-2022/CVE-2022-274xx/CVE-2022-27480.json +++ b/CVE-2022/CVE-2022-274xx/CVE-2022-27480.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27480", "sourceIdentifier": "productcert@siemens.com", "published": "2022-04-12T09:15:15.103", - "lastModified": "2022-04-19T18:26:08.570", + "lastModified": "2023-07-18T13:54:54.477", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-862" + "value": "CWE-425" } ] }, diff --git a/CVE-2022/CVE-2022-275xx/CVE-2022-27511.json b/CVE-2022/CVE-2022-275xx/CVE-2022-27511.json index ee23f810c1d..9f375eea716 100644 --- a/CVE-2022/CVE-2022-275xx/CVE-2022-27511.json +++ b/CVE-2022/CVE-2022-275xx/CVE-2022-27511.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27511", "sourceIdentifier": "secure@citrix.com", "published": "2022-06-16T19:15:07.773", - "lastModified": "2022-06-16T21:57:33.887", + "lastModified": "2023-07-18T13:54:38.100", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-275xx/CVE-2022-27549.json b/CVE-2022/CVE-2022-275xx/CVE-2022-27549.json index dde187131b7..7c37e4e7be7 100644 --- a/CVE-2022/CVE-2022-275xx/CVE-2022-27549.json +++ b/CVE-2022/CVE-2022-275xx/CVE-2022-27549.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27549", "sourceIdentifier": "psirt@hcl.com", "published": "2022-07-06T21:15:11.947", - "lastModified": "2022-07-14T17:28:42.017", + "lastModified": "2023-07-18T13:54:18.830", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-532" + "value": "CWE-312" } ] }, diff --git a/CVE-2022/CVE-2022-275xx/CVE-2022-27575.json b/CVE-2022/CVE-2022-275xx/CVE-2022-27575.json index 84d61900006..66e8859057f 100644 --- a/CVE-2022/CVE-2022-275xx/CVE-2022-27575.json +++ b/CVE-2022/CVE-2022-275xx/CVE-2022-27575.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27575", "sourceIdentifier": "mobile.security@samsung.com", "published": "2022-04-11T20:15:21.917", - "lastModified": "2022-04-18T14:50:22.647", + "lastModified": "2023-07-18T13:53:51.680", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "CWE-863" } ] }, diff --git a/CVE-2022/CVE-2022-277xx/CVE-2022-27779.json b/CVE-2022/CVE-2022-277xx/CVE-2022-27779.json index 1ddf1c54bba..8c18e226fe1 100644 --- a/CVE-2022/CVE-2022-277xx/CVE-2022-27779.json +++ b/CVE-2022/CVE-2022-277xx/CVE-2022-27779.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27779", "sourceIdentifier": "support@hackerone.com", "published": "2022-06-02T14:15:44.093", - "lastModified": "2023-01-05T17:58:47.157", + "lastModified": "2023-07-18T13:55:45.337", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2022/CVE-2022-278xx/CVE-2022-27891.json b/CVE-2022/CVE-2022-278xx/CVE-2022-27891.json index 19cd8824709..94a46b0ef92 100644 --- a/CVE-2022/CVE-2022-278xx/CVE-2022-27891.json +++ b/CVE-2022/CVE-2022-278xx/CVE-2022-27891.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27891", "sourceIdentifier": "cve-coordination@palantir.com", "published": "2023-02-16T16:15:12.020", - "lastModified": "2023-02-25T03:27:51.003", + "lastModified": "2023-07-18T13:55:35.387", "vulnStatus": "Analyzed", "descriptions": [ { @@ -61,7 +61,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-306" } ] }, diff --git a/CVE-2022/CVE-2022-27xx/CVE-2022-2732.json b/CVE-2022/CVE-2022-27xx/CVE-2022-2732.json index 321ae84677c..df2d91031e7 100644 --- a/CVE-2022/CVE-2022-27xx/CVE-2022-2732.json +++ b/CVE-2022/CVE-2022-27xx/CVE-2022-2732.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2732", "sourceIdentifier": "security@huntr.dev", "published": "2022-08-09T12:15:08.357", - "lastModified": "2022-08-12T14:15:50.220", + "lastModified": "2023-07-18T13:55:10.200", "vulnStatus": "Analyzed", "descriptions": [ { @@ -62,8 +62,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28135.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28135.json index a4e25b668eb..643ac9138e9 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28135.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28135.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28135", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:08.137", - "lastModified": "2022-04-04T19:16:40.173", + "lastModified": "2023-07-18T13:55:54.120", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-522" } ] }, diff --git a/CVE-2022/CVE-2022-308xx/CVE-2022-30858.json b/CVE-2022/CVE-2022-308xx/CVE-2022-30858.json index b9df35aa93a..91dc40b13ab 100644 --- a/CVE-2022/CVE-2022-308xx/CVE-2022-30858.json +++ b/CVE-2022/CVE-2022-308xx/CVE-2022-30858.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30858", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T19:15:09.137", - "lastModified": "2023-07-17T19:15:09.137", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:10.100", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4146.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4146.json index 0522ac0b5d4..cdd62ecbae0 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4146.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4146.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4146", "sourceIdentifier": "hirt@hitachi.co.jp", "published": "2023-07-18T03:15:55.067", - "lastModified": "2023-07-18T03:15:55.067", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45828.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45828.json new file mode 100644 index 00000000000..5b086c58514 --- /dev/null +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45828.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-45828", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T12:15:11.870", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in NooTheme Noo Timetable plugin <=\u00a02.1.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/noo-timetable/wordpress-noo-timetable-responsive-calendar-auto-sync-wordpress-plugin-plugin-2-1-3-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46857.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46857.json new file mode 100644 index 00000000000..1032e4680e7 --- /dev/null +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46857.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-46857", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T12:15:12.057", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SiteAlert plugin <=\u00a01.9.7 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/my-wp-health-check/wordpress-sitealert-uptime-speed-and-security-monitoring-for-wordpress-plugin-1-9-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47169.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47169.json new file mode 100644 index 00000000000..ab26831d45e --- /dev/null +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47169.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-47169", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T13:15:11.613", + "lastModified": "2023-07-18T13:15:11.613", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in StaxWP Visibility Logic for Elementor plugin <=\u00a02.3.4 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/visibility-logic-elementor/wordpress-visibility-logic-for-elementor-plugin-2-3-4-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23660.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23660.json new file mode 100644 index 00000000000..f6c0ed96edf --- /dev/null +++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23660.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-23660", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T13:15:11.713", + "lastModified": "2023-07-18T13:15:11.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (subscriber+) SQL Injection (SQLi) vulnerability in MainWP MainWP Maintenance Extension plugin <=\u00a04.1.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/articles/multiple-vulnerabilities-affecting-mainwp-extensions?_s_id=cve", + "source": "audit@patchstack.com" + }, + { + "url": "https://patchstack.com/database/vulnerability/mainwp-maintenance-extension/wordpress-mainwp-maintenance-extension-plugin-4-1-1-subscriber-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2433.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2433.json index 603771b37c9..48d42c32825 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2433.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2433.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2433", "sourceIdentifier": "security@wordfence.com", "published": "2023-07-18T09:15:11.067", - "lastModified": "2023-07-18T09:15:11.067", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25036.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25036.json new file mode 100644 index 00000000000..11a1bf21d87 --- /dev/null +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25036.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25036", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T13:15:11.810", + "lastModified": "2023-07-18T13:15:11.810", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in akhlesh-nagar, a.Ankit Social Media Icons Widget plugin <=\u00a01.6 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/spoontalk-social-media-icons-widget/wordpress-social-media-icons-widget-plugin-1-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25473.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25473.json new file mode 100644 index 00000000000..8fc31df0e62 --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25473.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25473", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T12:15:12.160", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Miro Mannino Flickr Justified Gallery plugin <=\u00a03.5 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/flickr-justified-gallery/wordpress-flickr-justified-gallery-plugin-3-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25475.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25475.json new file mode 100644 index 00000000000..4ec3582b3b5 --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25475.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25475", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T12:15:12.247", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Vladimir Prelovac Smart YouTube PRO plugin <=\u00a04.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/smart-youtube/wordpress-smart-youtube-pro-plugin-4-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25482.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25482.json new file mode 100644 index 00000000000..4afbc82a043 --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25482.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25482", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T12:15:12.337", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mike Martel WP Tiles plugin <=\u00a01.1.2 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-tiles/wordpress-wp-tiles-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28864.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28864.json index 30ad34e6540..2e317964f54 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28864.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28864.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28864", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T20:15:13.343", - "lastModified": "2023-07-17T20:15:13.343", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:10.100", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31998.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31998.json index d57f0477907..d2f5ff5fc00 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31998.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31998.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31998", "sourceIdentifier": "support@hackerone.com", "published": "2023-07-18T03:15:55.163", - "lastModified": "2023-07-18T03:15:55.163", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34142.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34142.json index 4345661b951..2ce145765dd 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34142.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34142.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34142", "sourceIdentifier": "hirt@hitachi.co.jp", "published": "2023-07-18T03:15:55.427", - "lastModified": "2023-07-18T03:15:55.427", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34143.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34143.json index 80f5b912952..ddb3596b2fa 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34143.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34143.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34143", "sourceIdentifier": "hirt@hitachi.co.jp", "published": "2023-07-18T03:15:55.510", - "lastModified": "2023-07-18T03:15:55.510", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34432.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34432.json index 5b985004cd4..73c66d59a7b 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34432.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34432.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34432", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-10T21:15:10.763", - "lastModified": "2023-07-11T12:43:16.387", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:53:51.417", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,14 +54,82 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sound_exchange_project:sound_exchange:*:*:*:*:*:*:*:*", + "versionEndIncluding": "14.4.3", + "matchCriteriaId": "F2B81E4A-C528-4569-B683-A9CA898C680A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BB176AC3-3CDA-4DDA-9089-C67B2F73AA62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-34432", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212291", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3403.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3403.json index 37033b01945..891be11dc79 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3403.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3403.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3403", "sourceIdentifier": "security@wordfence.com", "published": "2023-07-18T03:15:55.673", - "lastModified": "2023-07-18T03:15:55.673", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3459.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3459.json index 76d206b1e59..a1895db4da2 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3459.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3459.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3459", "sourceIdentifier": "security@wordfence.com", "published": "2023-07-18T03:15:55.793", - "lastModified": "2023-07-18T03:15:55.793", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35352.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35352.json index 85098272bdd..cc793fcbb56 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35352.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35352.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35352", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:19.307", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:50:11.260", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,63 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35352", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35353.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35353.json index 2047c92e544..223ad9b1c4f 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35353.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35353.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35353", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:19.360", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:53:13.173", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,89 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6085", + "matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4645", + "matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3208", + "matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3208", + "matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2176", + "matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1992", + "matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35353", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35356.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35356.json index d37b8b6a525..d12fbdbc8f0 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35356.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35356.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35356", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:19.413", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:34:07.400", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,89 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6085", + "matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4645", + "matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3208", + "matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3208", + "matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2176", + "matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1992", + "matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35356", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35357.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35357.json index 4979464de3c..0b8294b339f 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35357.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35357.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35357", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:19.467", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:37:13.943", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,89 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6085", + "matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4645", + "matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3208", + "matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3208", + "matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2176", + "matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1992", + "matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35357", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35358.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35358.json index aa4461e8ea6..8d21941c885 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35358.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35358.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35358", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:19.520", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:37:29.030", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,89 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6085", + "matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4645", + "matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3208", + "matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3208", + "matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2176", + "matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1992", + "matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35358", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35360.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35360.json index a8f1c45e638..d9f9653f061 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35360.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35360.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35360", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:19.577", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:44:05.863", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,105 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20048", + "matchCriteriaId": "CA7DB0E9-3DCD-4FAE-8F9A-20D15E061ED7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6085", + "matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4645", + "matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3208", + "matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3208", + "matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2176", + "matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1992", + "matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35360", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35361.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35361.json index f1d4ba0110d..ccf7fc5ad78 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35361.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35361.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35361", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:19.633", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:44:17.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,105 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20048", + "matchCriteriaId": "CA7DB0E9-3DCD-4FAE-8F9A-20D15E061ED7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6085", + "matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4645", + "matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3208", + "matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3208", + "matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2176", + "matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1992", + "matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35361", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35362.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35362.json index d0abae5798b..30a45791777 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35362.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35362.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35362", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:19.687", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:53:23.963", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,105 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20048", + "matchCriteriaId": "CA7DB0E9-3DCD-4FAE-8F9A-20D15E061ED7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6085", + "matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4645", + "matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3208", + "matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3208", + "matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2176", + "matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1992", + "matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35362", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35363.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35363.json index adb145952f0..4636e72c316 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35363.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35363.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35363", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:19.740", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:30:37.973", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4645", + "matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3208", + "matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3208", + "matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2176", + "matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1992", + "matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35363", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35364.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35364.json index 39a13ebcf2f..b6161dd908c 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35364.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35364.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35364", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:19.797", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:31:29.590", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4645", + "matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3208", + "matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3208", + "matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2176", + "matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1992", + "matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35364", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35365.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35365.json index f968e09e408..6a229a0285d 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35365.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35365.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35365", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:19.850", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:55:40.097", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,115 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20048", + "matchCriteriaId": "CA7DB0E9-3DCD-4FAE-8F9A-20D15E061ED7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6085", + "matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4645", + "matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3208", + "matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3208", + "matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2176", + "matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1992", + "matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35365", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36825.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36825.json index 2ca092fec01..3cd3abb6b6d 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36825.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36825.json @@ -2,12 +2,12 @@ "id": "CVE-2023-36825", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-11T18:15:20.417", - "lastModified": "2023-07-12T12:46:41.413", + "lastModified": "2023-07-18T13:15:11.907", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. This vulnerability is related to the deserialization of untrusted data from the `_state` query parameter, which can result in remote code execution. The issue has been addressed in version `14.5.0`. Users are advised to upgrade their software to this version or any subsequent versions that include the patch.\n" + "value": "Orchid is a Laravel package that allows application development of back-office applications, admin/user panels, and dashboards. A vulnerability present starting in version 14.0.0-alpha4 and prior to version 14.5.0 is related to the deserialization of untrusted data from the `_state` query parameter, which can result in remote code execution. The issue has been addressed in version 14.5.0. Users are advised to upgrade their software to this version or any subsequent versions that include the patch. There are no known workarounds." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3607.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3607.json index d7d182baecd..00b505ff453 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3607.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3607.json @@ -2,15 +2,41 @@ "id": "CVE-2023-3607", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-10T21:15:10.887", - "lastModified": "2023-07-11T12:43:16.387", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:47:32.097", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in kodbox 1.26. It has been declared as critical. This vulnerability affects the function Execute of the file webconsole.php.txt of the component WebConsole Plug-In. The manipulation leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-233476. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en kodbox v1.26. Ha sido declarada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n \"Execute\" del fichero \"webconsole.php.txt\" del componente \"WebConsole Plug-In\". La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos de tipo \"os\". El exploit ha sido revelado al p\u00fablico y puede ser utilizado. El identificador de esta vulnerabilidad es VDB-233476. NOTA: Se contact\u00f3 con el proveedor a tiempo sobre esta divulgaci\u00f3n pero no respondi\u00f3 de ninguna manera. " } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +97,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kodcloud:kodbox:1.26:*:*:*:*:*:*:*", + "matchCriteriaId": "FE5E096E-4A79-4CDA-83AC-92939920F100" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mohdkey/cve/blob/main/kodbox.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.233476", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.233476", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3608.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3608.json index f26b3dc7b83..a8ef0446e0a 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3608.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3608.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3608", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-10T22:15:09.530", - "lastModified": "2023-07-11T12:43:16.387", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:31:54.110", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +93,58 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ruijienetworks:bcr810w_firmware:2.5.10:*:*:*:*:*:*:*", + "matchCriteriaId": "34F0457A-FE7A-40D4-8251-F67A9C2A7767" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:ruijienetworks:bcr810w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB2602D4-1664-4D90-85FB-61483FAD69AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cq535454518/cve/blob/main/RG-BCR810W.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.233477", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.233477", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-371xx/CVE-2023-37153.json b/CVE-2023/CVE-2023-371xx/CVE-2023-37153.json index ea55aabdb50..ad2a38c4aa3 100644 --- a/CVE-2023/CVE-2023-371xx/CVE-2023-37153.json +++ b/CVE-2023/CVE-2023-371xx/CVE-2023-37153.json @@ -2,23 +2,82 @@ "id": "CVE-2023-37153", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-10T16:15:53.610", - "lastModified": "2023-07-10T16:27:17.833", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-18T13:09:10.123", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "KodExplorer 4.51 contains a Cross-Site Scripting (XSS) vulnerability in the Description box of the Light App creation feature. An attacker can exploit this vulnerability by injecting XSS syntax into the Description field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kodcloud:kodexplorer:4.51:*:*:*:*:*:*:*", + "matchCriteriaId": "C60D895F-51BD-4FAF-B449-B04037016307" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/KodExplorer4.51.03.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/kalcaddle/KodExplorer", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37265.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37265.json index 4a65cf3cfcd..08b13680e0f 100644 --- a/CVE-2023/CVE-2023-372xx/CVE-2023-37265.json +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37265.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37265", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-17T21:15:09.653", - "lastModified": "2023-07-17T21:15:09.653", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37266.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37266.json index a2cb588d942..6af150b956e 100644 --- a/CVE-2023/CVE-2023-372xx/CVE-2023-37266.json +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37266.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37266", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-17T21:15:09.733", - "lastModified": "2023-07-17T21:15:09.733", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37386.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37386.json new file mode 100644 index 00000000000..b59deb1f675 --- /dev/null +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37386.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-37386", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T13:15:12.013", + "lastModified": "2023-07-18T13:15:12.013", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Media Library Helper plugin <=\u00a01.2.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/media-library-helper/wordpress-media-library-helper-by-codexin-plugin-1-2-0-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37387.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37387.json new file mode 100644 index 00000000000..d9e387efc74 --- /dev/null +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37387.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-37387", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T13:15:12.103", + "lastModified": "2023-07-18T13:15:12.103", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme Classified Listing plugin <=\u00a02.4.5 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/classified-listing/wordpress-classified-listing-plugin-2-4-5-cross-site-request-forgery-csrf-leading-to-thumbnail-removal-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37461.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37461.json index 9e52f40b776..3eb9e3dcb3f 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37461.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37461.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37461", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-17T20:15:13.470", - "lastModified": "2023-07-17T20:15:13.470", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:10.100", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37476.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37476.json index d741e28dd38..14747ea309a 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37476.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37476.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37476", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-17T22:15:09.450", - "lastModified": "2023-07-17T22:15:09.450", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37479.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37479.json index de894d2d567..c13a83b86b8 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37479.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37479.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37479", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-17T23:15:08.973", - "lastModified": "2023-07-17T23:15:08.973", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-377xx/CVE-2023-37769.json b/CVE-2023/CVE-2023-377xx/CVE-2023-37769.json index cdb228d80b5..5f57c535f7f 100644 --- a/CVE-2023/CVE-2023-377xx/CVE-2023-37769.json +++ b/CVE-2023/CVE-2023-377xx/CVE-2023-37769.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37769", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T20:15:13.547", - "lastModified": "2023-07-17T20:15:13.547", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:10.100", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-377xx/CVE-2023-37770.json b/CVE-2023/CVE-2023-377xx/CVE-2023-37770.json index 45fc3322663..007f00ab15e 100644 --- a/CVE-2023/CVE-2023-377xx/CVE-2023-37770.json +++ b/CVE-2023/CVE-2023-377xx/CVE-2023-37770.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37770", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T20:15:13.587", - "lastModified": "2023-07-17T20:15:13.587", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-377xx/CVE-2023-37781.json b/CVE-2023/CVE-2023-377xx/CVE-2023-37781.json index 9a53e73eb7a..0118a8af1f0 100644 --- a/CVE-2023/CVE-2023-377xx/CVE-2023-37781.json +++ b/CVE-2023/CVE-2023-377xx/CVE-2023-37781.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37781", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T20:15:13.623", - "lastModified": "2023-07-17T20:15:13.623", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-377xx/CVE-2023-37791.json b/CVE-2023/CVE-2023-377xx/CVE-2023-37791.json index 65913baecf2..6165ffdcbb4 100644 --- a/CVE-2023/CVE-2023-377xx/CVE-2023-37791.json +++ b/CVE-2023/CVE-2023-377xx/CVE-2023-37791.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37791", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T19:15:09.440", - "lastModified": "2023-07-17T19:15:09.440", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:10.100", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37889.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37889.json new file mode 100644 index 00000000000..6582663f380 --- /dev/null +++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37889.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-37889", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T13:15:12.197", + "lastModified": "2023-07-18T13:15:12.197", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPAdmin WPAdmin AWS CDN plugin <=\u00a02.0.13 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/aws-cdn-by-wpadmin/wordpress-wpadmin-aws-cdn-plugin-2-0-13-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37892.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37892.json new file mode 100644 index 00000000000..fa9405dcde9 --- /dev/null +++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37892.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-37892", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T13:15:12.290", + "lastModified": "2023-07-18T13:15:12.290", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Kemal YAZICI - PluginPress Shortcode IMDB plugin <=\u00a06.0.8 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/shortcode-imdb/wordpress-shortcode-imdb-plugin-6-0-8-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37973.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37973.json new file mode 100644 index 00000000000..141fb41f400 --- /dev/null +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37973.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-37973", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-07-18T13:15:12.387", + "lastModified": "2023-07-18T13:15:12.387", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in David Pokorny Replace Word plugin <=\u00a02.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/replace-word/wordpress-replace-word-plugin-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3708.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3708.json index e50b344692c..51be776d699 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3708.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3708.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3708", "sourceIdentifier": "security@wordfence.com", "published": "2023-07-18T03:15:55.897", - "lastModified": "2023-07-18T03:15:55.897", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3709.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3709.json index f4a789a4b5a..b37535c95d7 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3709.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3709.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3709", "sourceIdentifier": "security@wordfence.com", "published": "2023-07-18T03:15:56.010", - "lastModified": "2023-07-18T03:15:56.010", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3713.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3713.json index 0ce5e9f4b57..4abff8dbe55 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3713.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3713.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3713", "sourceIdentifier": "security@wordfence.com", "published": "2023-07-18T03:15:56.110", - "lastModified": "2023-07-18T03:15:56.110", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3714.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3714.json index fffd4dfe1d1..3dab7fb4594 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3714.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3714.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3714", "sourceIdentifier": "security@wordfence.com", "published": "2023-07-18T03:15:56.207", - "lastModified": "2023-07-18T03:15:56.207", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3724.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3724.json index f128af4539b..f1f2fd86032 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3724.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3724.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3724", "sourceIdentifier": "facts@wolfssl.com", "published": "2023-07-17T22:15:09.587", - "lastModified": "2023-07-17T22:15:09.587", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3743.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3743.json new file mode 100644 index 00000000000..f79d8a99e4d --- /dev/null +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3743.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-3743", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2023-07-18T12:15:12.427", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Ap Page Builder, in versions lower than 1.7.8.2, could allow a remote attacker to send a specially crafted SQL query to the product_one_img parameter to retrieve the information stored in the database.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-vulnerability-leothemes-ap-page-builder", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38326.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38326.json new file mode 100644 index 00000000000..24e03955833 --- /dev/null +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38326.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2023-38326", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-07-18T13:15:12.483", + "lastModified": "2023-07-18T13:15:12.483", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38403.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38403.json index b2857c97963..f3fa455e69a 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38403.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38403.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38403", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T21:15:09.800", - "lastModified": "2023-07-17T21:15:09.800", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38404.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38404.json index 37c865178f6..70b6039fea6 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38404.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38404.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38404", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T21:15:09.847", - "lastModified": "2023-07-17T21:15:09.847", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38405.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38405.json index 7e26a59a101..c002734ca2f 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38405.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38405.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38405", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T21:15:09.907", - "lastModified": "2023-07-17T21:15:09.907", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38409.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38409.json index 08708388c3c..a9281f38e0d 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38409.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38409.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38409", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-17T22:15:09.540", - "lastModified": "2023-07-17T22:15:09.540", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38426.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38426.json index 04bb0ac3532..e33ff3d2aa8 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38426.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38426.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38426", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.483", - "lastModified": "2023-07-18T00:15:09.483", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38427.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38427.json index c4bf6b285ee..322efe6c74a 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38427.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38427.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38427", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.530", - "lastModified": "2023-07-18T00:15:09.530", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38428.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38428.json index 77d3b31e733..0ab0c162543 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38428.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38428.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38428", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.577", - "lastModified": "2023-07-18T00:15:09.577", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38429.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38429.json index 6d711180490..fb2700d6782 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38429.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38429.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38429", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.620", - "lastModified": "2023-07-18T00:15:09.620", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38430.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38430.json index 257ee458e74..c1913b4ee65 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38430.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38430.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38430", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.663", - "lastModified": "2023-07-18T00:15:09.663", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38431.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38431.json index 8f234259b51..29d82c66cf5 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38431.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38431.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38431", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.707", - "lastModified": "2023-07-18T00:15:09.707", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38432.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38432.json index 6c9392b0981..b8bb3b17eaf 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38432.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38432.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38432", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.750", - "lastModified": "2023-07-18T00:15:09.750", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:59:03.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38434.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38434.json index 5d7f7f9eda8..9f8da95f935 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38434.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38434.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38434", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T03:15:55.610", - "lastModified": "2023-07-18T03:15:55.610", - "vulnStatus": "Received", + "lastModified": "2023-07-18T12:58:57.160", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index f2dfa58e338..166eb1526d8 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-18T12:01:11.195601+00:00 +2023-07-18T14:00:47.612665+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-18T11:54:08.147000+00:00 +2023-07-18T13:55:54.120000+00:00 ``` ### Last Data Feed Release @@ -29,23 +29,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -220508 +220524 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `16` +* [CVE-2018-25088](CVE-2018/CVE-2018-250xx/CVE-2018-25088.json) (`2023-07-18T13:15:11.187`) +* [CVE-2022-45828](CVE-2022/CVE-2022-458xx/CVE-2022-45828.json) (`2023-07-18T12:15:11.870`) +* [CVE-2022-46857](CVE-2022/CVE-2022-468xx/CVE-2022-46857.json) (`2023-07-18T12:15:12.057`) +* [CVE-2022-47169](CVE-2022/CVE-2022-471xx/CVE-2022-47169.json) (`2023-07-18T13:15:11.613`) +* [CVE-2023-25473](CVE-2023/CVE-2023-254xx/CVE-2023-25473.json) (`2023-07-18T12:15:12.160`) +* [CVE-2023-25475](CVE-2023/CVE-2023-254xx/CVE-2023-25475.json) (`2023-07-18T12:15:12.247`) +* [CVE-2023-25482](CVE-2023/CVE-2023-254xx/CVE-2023-25482.json) (`2023-07-18T12:15:12.337`) +* [CVE-2023-3743](CVE-2023/CVE-2023-37xx/CVE-2023-3743.json) (`2023-07-18T12:15:12.427`) +* [CVE-2023-23660](CVE-2023/CVE-2023-236xx/CVE-2023-23660.json) (`2023-07-18T13:15:11.713`) +* [CVE-2023-25036](CVE-2023/CVE-2023-250xx/CVE-2023-25036.json) (`2023-07-18T13:15:11.810`) +* [CVE-2023-37386](CVE-2023/CVE-2023-373xx/CVE-2023-37386.json) (`2023-07-18T13:15:12.013`) +* [CVE-2023-37387](CVE-2023/CVE-2023-373xx/CVE-2023-37387.json) (`2023-07-18T13:15:12.103`) +* [CVE-2023-37889](CVE-2023/CVE-2023-378xx/CVE-2023-37889.json) (`2023-07-18T13:15:12.197`) +* [CVE-2023-37892](CVE-2023/CVE-2023-378xx/CVE-2023-37892.json) (`2023-07-18T13:15:12.290`) +* [CVE-2023-37973](CVE-2023/CVE-2023-379xx/CVE-2023-37973.json) (`2023-07-18T13:15:12.387`) +* [CVE-2023-38326](CVE-2023/CVE-2023-383xx/CVE-2023-38326.json) (`2023-07-18T13:15:12.483`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `78` -* [CVE-2023-35698](CVE-2023/CVE-2023-356xx/CVE-2023-35698.json) (`2023-07-18T11:44:50.397`) -* [CVE-2023-35699](CVE-2023/CVE-2023-356xx/CVE-2023-35699.json) (`2023-07-18T11:46:43.907`) -* [CVE-2023-3118](CVE-2023/CVE-2023-31xx/CVE-2023-3118.json) (`2023-07-18T11:50:22.380`) -* [CVE-2023-37392](CVE-2023/CVE-2023-373xx/CVE-2023-37392.json) (`2023-07-18T11:54:08.147`) +* [CVE-2023-38428](CVE-2023/CVE-2023-384xx/CVE-2023-38428.json) (`2023-07-18T12:59:03.770`) +* [CVE-2023-38429](CVE-2023/CVE-2023-384xx/CVE-2023-38429.json) (`2023-07-18T12:59:03.770`) +* [CVE-2023-38430](CVE-2023/CVE-2023-384xx/CVE-2023-38430.json) (`2023-07-18T12:59:03.770`) +* [CVE-2023-38431](CVE-2023/CVE-2023-384xx/CVE-2023-38431.json) (`2023-07-18T12:59:03.770`) +* [CVE-2023-38432](CVE-2023/CVE-2023-384xx/CVE-2023-38432.json) (`2023-07-18T12:59:03.770`) +* [CVE-2023-37791](CVE-2023/CVE-2023-377xx/CVE-2023-37791.json) (`2023-07-18T12:59:10.100`) +* [CVE-2023-28864](CVE-2023/CVE-2023-288xx/CVE-2023-28864.json) (`2023-07-18T12:59:10.100`) +* [CVE-2023-37461](CVE-2023/CVE-2023-374xx/CVE-2023-37461.json) (`2023-07-18T12:59:10.100`) +* [CVE-2023-37769](CVE-2023/CVE-2023-377xx/CVE-2023-37769.json) (`2023-07-18T12:59:10.100`) +* [CVE-2023-37153](CVE-2023/CVE-2023-371xx/CVE-2023-37153.json) (`2023-07-18T13:09:10.123`) +* [CVE-2023-36825](CVE-2023/CVE-2023-368xx/CVE-2023-36825.json) (`2023-07-18T13:15:11.907`) +* [CVE-2023-35363](CVE-2023/CVE-2023-353xx/CVE-2023-35363.json) (`2023-07-18T13:30:37.973`) +* [CVE-2023-35364](CVE-2023/CVE-2023-353xx/CVE-2023-35364.json) (`2023-07-18T13:31:29.590`) +* [CVE-2023-3608](CVE-2023/CVE-2023-36xx/CVE-2023-3608.json) (`2023-07-18T13:31:54.110`) +* [CVE-2023-35356](CVE-2023/CVE-2023-353xx/CVE-2023-35356.json) (`2023-07-18T13:34:07.400`) +* [CVE-2023-35357](CVE-2023/CVE-2023-353xx/CVE-2023-35357.json) (`2023-07-18T13:37:13.943`) +* [CVE-2023-35358](CVE-2023/CVE-2023-353xx/CVE-2023-35358.json) (`2023-07-18T13:37:29.030`) +* [CVE-2023-35360](CVE-2023/CVE-2023-353xx/CVE-2023-35360.json) (`2023-07-18T13:44:05.863`) +* [CVE-2023-35361](CVE-2023/CVE-2023-353xx/CVE-2023-35361.json) (`2023-07-18T13:44:17.307`) +* [CVE-2023-3607](CVE-2023/CVE-2023-36xx/CVE-2023-3607.json) (`2023-07-18T13:47:32.097`) +* [CVE-2023-35352](CVE-2023/CVE-2023-353xx/CVE-2023-35352.json) (`2023-07-18T13:50:11.260`) +* [CVE-2023-35353](CVE-2023/CVE-2023-353xx/CVE-2023-35353.json) (`2023-07-18T13:53:13.173`) +* [CVE-2023-35362](CVE-2023/CVE-2023-353xx/CVE-2023-35362.json) (`2023-07-18T13:53:23.963`) +* [CVE-2023-34432](CVE-2023/CVE-2023-344xx/CVE-2023-34432.json) (`2023-07-18T13:53:51.417`) +* [CVE-2023-35365](CVE-2023/CVE-2023-353xx/CVE-2023-35365.json) (`2023-07-18T13:55:40.097`) ## Download and Usage