From f938f1c87b16400dfd43729b363157b7bf94b3c3 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 23 May 2023 16:00:33 +0000 Subject: [PATCH] Auto-Update: 2023-05-23T16:00:29.409474+00:00 --- CVE-2015/CVE-2015-93xx/CVE-2015-9305.json | 6 +- CVE-2015/CVE-2015-93xx/CVE-2015-9307.json | 6 +- CVE-2015/CVE-2015-93xx/CVE-2015-9308.json | 6 +- CVE-2015/CVE-2015-93xx/CVE-2015-9309.json | 6 +- CVE-2016/CVE-2016-108xx/CVE-2016-10878.json | 6 +- CVE-2020/CVE-2020-115xx/CVE-2020-11514.json | 8 +- CVE-2020/CVE-2020-115xx/CVE-2020-11515.json | 8 +- CVE-2020/CVE-2020-93xx/CVE-2020-9334.json | 6 +- CVE-2022/CVE-2022-363xx/CVE-2022-36376.json | 8 +- CVE-2022/CVE-2022-416xx/CVE-2022-41610.json | 65 +++++++++- CVE-2022/CVE-2022-416xx/CVE-2022-41628.json | 136 +++++++++++++++++++- CVE-2022/CVE-2022-416xx/CVE-2022-41687.json | 71 +++++++++- CVE-2022/CVE-2022-416xx/CVE-2022-41690.json | 59 ++++++++- CVE-2022/CVE-2022-416xx/CVE-2022-41693.json | 59 ++++++++- CVE-2022/CVE-2022-417xx/CVE-2022-41769.json | 59 ++++++++- CVE-2022/CVE-2022-418xx/CVE-2022-41801.json | 59 ++++++++- CVE-2022/CVE-2022-434xx/CVE-2022-43474.json | 71 +++++++++- CVE-2022/CVE-2022-435xx/CVE-2022-43507.json | 59 ++++++++- CVE-2022/CVE-2022-462xx/CVE-2022-46279.json | 59 ++++++++- CVE-2022/CVE-2022-468xx/CVE-2022-46813.json | 55 ++++++++ CVE-2022/CVE-2022-468xx/CVE-2022-46851.json | 55 ++++++++ CVE-2022/CVE-2022-468xx/CVE-2022-46853.json | 55 ++++++++ CVE-2022/CVE-2022-47xx/CVE-2022-4774.json | 52 +++++++- CVE-2023/CVE-2023-02xx/CVE-2023-0233.json | 52 +++++++- CVE-2023/CVE-2023-04xx/CVE-2023-0490.json | 52 +++++++- CVE-2023/CVE-2023-05xx/CVE-2023-0520.json | 52 +++++++- CVE-2023/CVE-2023-237xx/CVE-2023-23705.json | 55 ++++++++ CVE-2023/CVE-2023-237xx/CVE-2023-23713.json | 55 ++++++++ CVE-2023/CVE-2023-238xx/CVE-2023-23878.json | 6 +- CVE-2023/CVE-2023-250xx/CVE-2023-25056.json | 55 ++++++++ CVE-2023/CVE-2023-260xx/CVE-2023-26011.json | 55 ++++++++ CVE-2023/CVE-2023-260xx/CVE-2023-26014.json | 55 ++++++++ CVE-2023/CVE-2023-284xx/CVE-2023-28473.json | 23 ++-- CVE-2023/CVE-2023-304xx/CVE-2023-30440.json | 59 +++++++++ CVE-2023/CVE-2023-318xx/CVE-2023-31842.json | 63 ++++++++- CVE-2023/CVE-2023-318xx/CVE-2023-31843.json | 63 ++++++++- CVE-2023/CVE-2023-318xx/CVE-2023-31844.json | 63 ++++++++- CVE-2023/CVE-2023-318xx/CVE-2023-31845.json | 63 ++++++++- CVE-2023/CVE-2023-333xx/CVE-2023-33359.json | 20 +++ CVE-2023/CVE-2023-333xx/CVE-2023-33361.json | 20 +++ CVE-2023/CVE-2023-333xx/CVE-2023-33362.json | 20 +++ CVE-2023/CVE-2023-335xx/CVE-2023-33599.json | 20 +++ CVE-2023/CVE-2023-336xx/CVE-2023-33617.json | 20 +++ README.md | 82 ++++++------ 44 files changed, 1783 insertions(+), 144 deletions(-) create mode 100644 CVE-2022/CVE-2022-468xx/CVE-2022-46813.json create mode 100644 CVE-2022/CVE-2022-468xx/CVE-2022-46851.json create mode 100644 CVE-2022/CVE-2022-468xx/CVE-2022-46853.json create mode 100644 CVE-2023/CVE-2023-237xx/CVE-2023-23705.json create mode 100644 CVE-2023/CVE-2023-237xx/CVE-2023-23713.json create mode 100644 CVE-2023/CVE-2023-250xx/CVE-2023-25056.json create mode 100644 CVE-2023/CVE-2023-260xx/CVE-2023-26011.json create mode 100644 CVE-2023/CVE-2023-260xx/CVE-2023-26014.json create mode 100644 CVE-2023/CVE-2023-304xx/CVE-2023-30440.json create mode 100644 CVE-2023/CVE-2023-333xx/CVE-2023-33359.json create mode 100644 CVE-2023/CVE-2023-333xx/CVE-2023-33361.json create mode 100644 CVE-2023/CVE-2023-333xx/CVE-2023-33362.json create mode 100644 CVE-2023/CVE-2023-335xx/CVE-2023-33599.json create mode 100644 CVE-2023/CVE-2023-336xx/CVE-2023-33617.json diff --git a/CVE-2015/CVE-2015-93xx/CVE-2015-9305.json b/CVE-2015/CVE-2015-93xx/CVE-2015-9305.json index 9d3fa8f7e74..ecadf193d00 100644 --- a/CVE-2015/CVE-2015-93xx/CVE-2015-9305.json +++ b/CVE-2015/CVE-2015-93xx/CVE-2015-9305.json @@ -2,7 +2,7 @@ "id": "CVE-2015-9305", "sourceIdentifier": "cve@mitre.org", "published": "2019-08-12T15:15:11.263", - "lastModified": "2019-08-15T20:07:28.203", + "lastModified": "2023-05-23T15:11:16.463", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:flippercode:google_map:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.3.7", - "matchCriteriaId": "81F0FB94-2C0C-4602-8383-9A0E84566351" + "matchCriteriaId": "F1790EAA-CA35-4A26-98A3-AB6BECE0C257" } ] } diff --git a/CVE-2015/CVE-2015-93xx/CVE-2015-9307.json b/CVE-2015/CVE-2015-93xx/CVE-2015-9307.json index 82bbb759dc4..47c17a33a57 100644 --- a/CVE-2015/CVE-2015-93xx/CVE-2015-9307.json +++ b/CVE-2015/CVE-2015-93xx/CVE-2015-9307.json @@ -2,7 +2,7 @@ "id": "CVE-2015-9307", "sourceIdentifier": "cve@mitre.org", "published": "2019-08-14T16:15:11.160", - "lastModified": "2023-03-01T02:27:24.920", + "lastModified": "2023-05-23T15:11:16.463", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:flippercode:google_map:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.3.10", - "matchCriteriaId": "D8096FAC-7EF8-4DE2-A2E7-19789CDAFFE9" + "matchCriteriaId": "76AB02C9-EB97-4FE9-BC59-D676A9582FF5" } ] } diff --git a/CVE-2015/CVE-2015-93xx/CVE-2015-9308.json b/CVE-2015/CVE-2015-93xx/CVE-2015-9308.json index 37e74b768c7..5cbc1a10524 100644 --- a/CVE-2015/CVE-2015-93xx/CVE-2015-9308.json +++ b/CVE-2015/CVE-2015-93xx/CVE-2015-9308.json @@ -2,7 +2,7 @@ "id": "CVE-2015-9308", "sourceIdentifier": "cve@mitre.org", "published": "2019-08-14T16:15:11.220", - "lastModified": "2023-03-01T02:30:31.997", + "lastModified": "2023-05-23T15:11:16.463", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:flippercode:google_map:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.3.10", - "matchCriteriaId": "D8096FAC-7EF8-4DE2-A2E7-19789CDAFFE9" + "matchCriteriaId": "76AB02C9-EB97-4FE9-BC59-D676A9582FF5" } ] } diff --git a/CVE-2015/CVE-2015-93xx/CVE-2015-9309.json b/CVE-2015/CVE-2015-93xx/CVE-2015-9309.json index c9f637bd5a4..95c45c4a2ed 100644 --- a/CVE-2015/CVE-2015-93xx/CVE-2015-9309.json +++ b/CVE-2015/CVE-2015-93xx/CVE-2015-9309.json @@ -2,7 +2,7 @@ "id": "CVE-2015-9309", "sourceIdentifier": "cve@mitre.org", "published": "2019-08-14T16:15:11.300", - "lastModified": "2023-03-01T02:32:10.413", + "lastModified": "2023-05-23T15:11:16.463", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:flippercode:google_map:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.3.10", - "matchCriteriaId": "D8096FAC-7EF8-4DE2-A2E7-19789CDAFFE9" + "matchCriteriaId": "76AB02C9-EB97-4FE9-BC59-D676A9582FF5" } ] } diff --git a/CVE-2016/CVE-2016-108xx/CVE-2016-10878.json b/CVE-2016/CVE-2016-108xx/CVE-2016-10878.json index d4b294da386..9cbb58560f5 100644 --- a/CVE-2016/CVE-2016-108xx/CVE-2016-10878.json +++ b/CVE-2016/CVE-2016-108xx/CVE-2016-10878.json @@ -2,7 +2,7 @@ "id": "CVE-2016-10878", "sourceIdentifier": "cve@mitre.org", "published": "2019-08-12T15:15:11.730", - "lastModified": "2023-02-24T19:45:59.353", + "lastModified": "2023-05-23T15:11:16.463", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:flippercode:google_map:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.1.2", - "matchCriteriaId": "8048DC98-9A2E-4665-A315-E2C5BBE2EB72" + "matchCriteriaId": "A4548F42-EBE4-4E67-8C74-06F1465BC5F3" } ] } diff --git a/CVE-2020/CVE-2020-115xx/CVE-2020-11514.json b/CVE-2020/CVE-2020-115xx/CVE-2020-11514.json index a1a07e9845a..d65065190b1 100644 --- a/CVE-2020/CVE-2020-115xx/CVE-2020-11514.json +++ b/CVE-2020/CVE-2020-115xx/CVE-2020-11514.json @@ -2,8 +2,8 @@ "id": "CVE-2020-11514", "sourceIdentifier": "cve@mitre.org", "published": "2020-04-07T17:15:13.573", - "lastModified": "2021-07-21T11:39:23.747", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-23T14:57:32.420", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rankmath:rankmath:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:rankmath:seo:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "1.0.40.2", - "matchCriteriaId": "2F280C36-E630-4380-8038-63CC226F9715" + "matchCriteriaId": "085DE307-EE37-47C5-BF61-874C59C8344A" } ] } diff --git a/CVE-2020/CVE-2020-115xx/CVE-2020-11515.json b/CVE-2020/CVE-2020-115xx/CVE-2020-11515.json index 024ba451901..b8ebc8492fb 100644 --- a/CVE-2020/CVE-2020-115xx/CVE-2020-11515.json +++ b/CVE-2020/CVE-2020-115xx/CVE-2020-11515.json @@ -2,8 +2,8 @@ "id": "CVE-2020-11515", "sourceIdentifier": "cve@mitre.org", "published": "2020-04-07T17:15:13.617", - "lastModified": "2020-04-07T19:47:47.837", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-23T14:57:32.420", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rankmath:rankmath:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:rankmath:seo:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "1.0.40.2", - "matchCriteriaId": "2F280C36-E630-4380-8038-63CC226F9715" + "matchCriteriaId": "085DE307-EE37-47C5-BF61-874C59C8344A" } ] } diff --git a/CVE-2020/CVE-2020-93xx/CVE-2020-9334.json b/CVE-2020/CVE-2020-93xx/CVE-2020-9334.json index 058ea09c7a8..dda31f40998 100644 --- a/CVE-2020/CVE-2020-93xx/CVE-2020-9334.json +++ b/CVE-2020/CVE-2020-93xx/CVE-2020-9334.json @@ -2,7 +2,7 @@ "id": "CVE-2020-9334", "sourceIdentifier": "cve@mitre.org", "published": "2020-02-25T17:15:13.587", - "lastModified": "2020-02-25T19:15:59.493", + "lastModified": "2023-05-23T14:22:22.827", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:enviragallery:photo_gallery:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:enviragallery:envira_gallery:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "1.7.6", - "matchCriteriaId": "6128754A-AF69-4E52-9C5C-69B181F5CFF1" + "matchCriteriaId": "B50EDB2D-E6E1-4EF7-9EC9-B75037621B1F" } ] } diff --git a/CVE-2022/CVE-2022-363xx/CVE-2022-36376.json b/CVE-2022/CVE-2022-363xx/CVE-2022-36376.json index 5436f11bde9..68588c60be7 100644 --- a/CVE-2022/CVE-2022-363xx/CVE-2022-36376.json +++ b/CVE-2022/CVE-2022-363xx/CVE-2022-36376.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36376", "sourceIdentifier": "audit@patchstack.com", "published": "2022-09-09T15:15:10.627", - "lastModified": "2022-09-14T14:53:32.817", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-23T14:57:32.420", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -79,9 +79,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rankmath:rankmath:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:rankmath:seo:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "1.0.95", - "matchCriteriaId": "CE968D3B-4F89-4524-944A-16D9E4628FE9" + "matchCriteriaId": "5CF0B4ED-4E62-4E72-B17F-EFDD3919645B" } ] } diff --git a/CVE-2022/CVE-2022-416xx/CVE-2022-41610.json b/CVE-2022/CVE-2022-416xx/CVE-2022-41610.json index c8479a8eb9b..90cbb25950f 100644 --- a/CVE-2022/CVE-2022-416xx/CVE-2022-41610.json +++ b/CVE-2022/CVE-2022-416xx/CVE-2022-41610.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41610", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:16.370", - "lastModified": "2023-05-10T14:38:25.967", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T15:40:00.390", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,49 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:endpoint_management_assistant_configuration_tool:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.4", + "matchCriteriaId": "E3EAFCB8-177D-469F-96B9-6D1D3FEDF665" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:manageability_commander:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4", + "matchCriteriaId": "16795C4A-AC04-493A-96CC-F23AC511D0EC" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00808.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-416xx/CVE-2022-41628.json b/CVE-2022/CVE-2022-416xx/CVE-2022-41628.json index 6fb9cf7f3a1..764249e3da7 100644 --- a/CVE-2022/CVE-2022-416xx/CVE-2022-41628.json +++ b/CVE-2022/CVE-2022-416xx/CVE-2022-41628.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41628", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:17.127", - "lastModified": "2023-05-10T14:38:37.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T15:59:19.260", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,120 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:nuc_p14e_laptop_element:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.44", + "matchCriteriaId": "E01DB3E8-AD45-46C8-B06D-0B99E1504312" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1DD582C-1660-4E6E-81A1-537BD1307A99" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AFD13A6-A390-4400-9029-2F4058CA17E2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1FED4C9-B680-4F44-ADC0-AC43D6B5F184" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F513002-D8C1-4D3A-9F79-4B52498F67E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-416xx/CVE-2022-41687.json b/CVE-2022/CVE-2022-416xx/CVE-2022-41687.json index 196663712e7..5e0510c522a 100644 --- a/CVE-2022/CVE-2022-416xx/CVE-2022-41687.json +++ b/CVE-2022/CVE-2022-416xx/CVE-2022-41687.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41687", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:18.417", - "lastModified": "2023-05-10T14:38:31.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T15:35:37.740", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,55 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:nuc_p14e_laptop_element:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.44", + "matchCriteriaId": "E01DB3E8-AD45-46C8-B06D-0B99E1504312" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-416xx/CVE-2022-41690.json b/CVE-2022/CVE-2022-416xx/CVE-2022-41690.json index c4bf4d87511..8b0c7a7c8ce 100644 --- a/CVE-2022/CVE-2022-416xx/CVE-2022-41690.json +++ b/CVE-2022/CVE-2022-416xx/CVE-2022-41690.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41690", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:18.737", - "lastModified": "2023-05-10T14:38:19.080", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T15:34:58.283", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:retail_edge_program:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "3.4.7", + "matchCriteriaId": "AFED798C-0421-4A5B-92EA-5D0365D50F5B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-416xx/CVE-2022-41693.json b/CVE-2022/CVE-2022-416xx/CVE-2022-41693.json index 82e27ce0355..c2cfef2f22b 100644 --- a/CVE-2022/CVE-2022-416xx/CVE-2022-41693.json +++ b/CVE-2022/CVE-2022-416xx/CVE-2022-41693.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41693", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:19.067", - "lastModified": "2023-05-10T14:38:42.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T15:29:10.507", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:quartus_prime:*:*:*:*:pro:*:*:*", + "versionEndExcluding": "22.3", + "matchCriteriaId": "9BCA1386-81BD-4F1F-AD41-C42FB77B2C39" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00799.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41769.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41769.json index 8082457690b..944ee196368 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41769.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41769.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41769", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:19.750", - "lastModified": "2023-05-10T14:38:19.080", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T15:02:51.017", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:connect_m:*:*:*:*:*:android:*:*", + "versionEndExcluding": "1.82", + "matchCriteriaId": "750A0344-943A-4230-8843-A3AEF2C9417F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00779.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-418xx/CVE-2022-41801.json b/CVE-2022/CVE-2022-418xx/CVE-2022-41801.json index c8eee05a759..bce4753f5fc 100644 --- a/CVE-2022/CVE-2022-418xx/CVE-2022-41801.json +++ b/CVE-2022/CVE-2022-418xx/CVE-2022-41801.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41801", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:21.153", - "lastModified": "2023-05-10T14:38:37.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T14:33:44.353", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:connect_m:*:*:*:*:*:android:*:*", + "versionEndExcluding": "1.82", + "matchCriteriaId": "750A0344-943A-4230-8843-A3AEF2C9417F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00779.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43474.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43474.json index e0cec2eb8ed..e284c8d7d17 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43474.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43474.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43474", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:23.727", - "lastModified": "2023-05-10T14:38:37.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T14:29:33.257", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,55 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:dsp_builder:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.4", + "matchCriteriaId": "1E463877-7825-41A1-979F-11F4B633B59D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:a:intel:quartus_prime:-:*:*:*:pro:*:*:*", + "matchCriteriaId": "4BC8EF35-DE1F-4F04-98BD-AAD8C3360CC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00816.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-435xx/CVE-2022-43507.json b/CVE-2022/CVE-2022-435xx/CVE-2022-43507.json index d8a9b921502..03423794fdf 100644 --- a/CVE-2022/CVE-2022-435xx/CVE-2022-43507.json +++ b/CVE-2022/CVE-2022-435xx/CVE-2022-43507.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43507", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:24.400", - "lastModified": "2023-05-10T14:38:25.967", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T14:20:04.157", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:quickassist_technology_engine:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.6.16", + "matchCriteriaId": "E4479CF3-0C39-439C-A3C1-9F11A656F9C4" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00798.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-462xx/CVE-2022-46279.json b/CVE-2022/CVE-2022-462xx/CVE-2022-46279.json index 01cffa7e8ae..811b0e8a5e2 100644 --- a/CVE-2022/CVE-2022-462xx/CVE-2022-46279.json +++ b/CVE-2022/CVE-2022-462xx/CVE-2022-46279.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46279", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:25.710", - "lastModified": "2023-05-10T14:38:19.080", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T14:21:58.433", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:retail_edge_program:*:*:*:*:*:android:*:*", + "versionEndExcluding": "3.0.301126", + "matchCriteriaId": "11BE1F3D-9368-4E7D-8D70-1DFC8ABBAE17" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46813.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46813.json new file mode 100644 index 00000000000..e86930b228e --- /dev/null +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46813.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-46813", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T15:15:09.107", + "lastModified": "2023-05-23T15:15:09.107", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Younes JFR. Advanced Database Cleaner plugin <=\u00a03.1.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/advanced-database-cleaner/wordpress-advanced-database-cleaner-plugin-3-1-1-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46851.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46851.json new file mode 100644 index 00000000000..2fb2264a8c8 --- /dev/null +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46851.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-46851", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T14:15:09.277", + "lastModified": "2023-05-23T14:18:11.573", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Brainstorm Force Starter Templates plugin <=\u00a03.1.20 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/astra-sites/wordpress-starter-templates-elementor-wordpress-beaver-builder-templates-plugin-3-1-20-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46853.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46853.json new file mode 100644 index 00000000000..8f40129a7bc --- /dev/null +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46853.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-46853", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T14:15:09.410", + "lastModified": "2023-05-23T14:18:11.573", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme The Post Grid plugin <=\u00a05.0.4 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/the-post-grid/wordpress-the-post-grid-shortcode-gutenberg-blocks-and-elementor-addon-for-post-grid-plugin-5-0-4-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4774.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4774.json index c4a31f8f118..918e26b32e5 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4774.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4774.json @@ -2,15 +2,38 @@ "id": "CVE-2022-4774", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-15T13:15:09.623", - "lastModified": "2023-05-15T13:26:09.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T15:42:56.457", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Bit Form WordPress plugin before 1.9 does not validate the file types uploaded via it's file upload form field, allowing unauthenticated users to upload arbitrary files types such as PHP or HTML files to the server, leading to Remote Code Execution." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bitapps:bit_form:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9", + "matchCriteriaId": "7D8A6178-1DC9-4F65-AA01-D8255569E912" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/2ae5c375-a6a0-4c0b-a9ef-e4d2a28bce5e", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0233.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0233.json index 055f43cf0c5..4bf584329b4 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0233.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0233.json @@ -2,15 +2,38 @@ "id": "CVE-2023-0233", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-15T13:15:09.700", - "lastModified": "2023-05-15T13:26:09.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T15:43:28.077", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The ActiveCampaign WordPress plugin before 8.1.12 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:activecampaign:activecampaign:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.1.12", + "matchCriteriaId": "F05B6E37-A00E-4D41-83D8-32F9ACA980DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/e95c85fd-fa47-45bd-b8e0-a7f33edd7130", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0490.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0490.json index d863cc1419e..1cb996f5a4c 100644 --- a/CVE-2023/CVE-2023-04xx/CVE-2023-0490.json +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0490.json @@ -2,15 +2,38 @@ "id": "CVE-2023-0490", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-15T13:15:09.753", - "lastModified": "2023-05-15T13:26:09.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T15:43:58.993", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The f(x) TOC WordPress plugin through 1.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -23,10 +46,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f\\(x\\)_toc_project:f\\(x\\)_toc:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.0", + "matchCriteriaId": "DAA247A9-7EF5-438E-A357-71145263F305" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/9b497d21-f075-41a9-afec-3e24034c8c63", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0520.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0520.json index 934a29e3606..1d2607d4502 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0520.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0520.json @@ -2,15 +2,38 @@ "id": "CVE-2023-0520", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-15T13:15:09.810", - "lastModified": "2023-05-15T13:26:09.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T15:45:27.587", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The RapidExpCart WordPress plugin through 1.0 does not sanitize and escape the url parameter in the rapidexpcart endpoint before storing it and outputting it back in the page, leading to a Stored Cross-Site Scripting vulnerability which could be used against high-privilege users such as admin, furthermore lack of csrf protection means an attacker can trick a logged in admin to perform the attack by submitting a hidden form." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "contact@wpscan.com", @@ -27,10 +50,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rapidexp:rapidexpcart:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "4EEE60E3-1875-436C-8EB1-176C5385E6ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/be4f7ff9-af79-477b-9f47-e40e25a3558e", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23705.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23705.json new file mode 100644 index 00000000000..ca6fd1ea9b6 --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23705.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23705", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T14:15:09.507", + "lastModified": "2023-05-23T14:18:11.573", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in HM Plugin WordPress Books Gallery plugin <=\u00a04.4.8 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-books-gallery/wordpress-wordpress-books-gallery-plugin-4-4-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23713.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23713.json new file mode 100644 index 00000000000..9b05fddd356 --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23713.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23713", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T14:15:09.577", + "lastModified": "2023-05-23T14:18:11.573", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Manoj Thulasidas Theme Tweaker plugin <=\u00a05.20 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/theme-tweaker-lite/wordpress-theme-tweaker-plugin-5-20-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23878.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23878.json index ae1475facb5..9175763b4e7 100644 --- a/CVE-2023/CVE-2023-238xx/CVE-2023-23878.json +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23878.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23878", "sourceIdentifier": "audit@patchstack.com", "published": "2023-04-04T12:15:07.280", - "lastModified": "2023-04-11T16:34:41.010", + "lastModified": "2023-05-23T15:11:16.463", "vulnStatus": "Analyzed", "descriptions": [ { @@ -75,9 +75,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:flippercode:google_map:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.4.0", - "matchCriteriaId": "CC04B2B6-5DF3-46B6-94D6-7BBDAC805FCA" + "matchCriteriaId": "0D747DA7-0673-417C-9295-195295A35D60" } ] } diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25056.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25056.json new file mode 100644 index 00000000000..f5f3fc8a795 --- /dev/null +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25056.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25056", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T14:15:09.657", + "lastModified": "2023-05-23T14:18:11.573", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SlickRemix Feed Them Social plugin <=\u00a03.0.2 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/feed-them-social/wordpress-feed-them-social-for-twitter-feed-youtube-and-more-plugin-3-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26011.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26011.json new file mode 100644 index 00000000000..83305d54171 --- /dev/null +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26011.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-26011", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T15:15:09.190", + "lastModified": "2023-05-23T15:15:09.190", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Tim Eckel Read More Excerpt Link plugin <=\u00a01.6 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/read-more-excerpt-link/wordpress-read-more-excerpt-link-plugin-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26014.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26014.json new file mode 100644 index 00000000000..0789740606b --- /dev/null +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26014.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-26014", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-23T15:15:09.263", + "lastModified": "2023-05-23T15:15:09.263", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Tim Eckel Minify HTML plugin <=\u00a02.1.7 vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/minify-html-markup/wordpress-minify-html-plugin-2-02-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28473.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28473.json index b9b6f5ce868..a367516dcdf 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28473.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28473.json @@ -2,8 +2,9 @@ "id": "CVE-2023-28473", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-28T14:15:10.447", - "lastModified": "2023-05-05T15:13:54.867", + "lastModified": "2023-05-23T15:38:06.487", "vulnStatus": "Analyzed", + "evaluatorComment": "u", "descriptions": [ { "lang": "en", @@ -17,20 +18,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L", "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW" }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 + "exploitabilityScore": 0.7, + "impactScore": 2.5 } ] }, diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30440.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30440.json new file mode 100644 index 00000000000..086d70bc287 --- /dev/null +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30440.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-30440", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-05-23T14:15:09.733", + "lastModified": "2023-05-23T14:18:11.573", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerVM Hypervisor FW860.00 through FW860.B3, FW950.00 through FW950.70, FW1010.00 through FW1010.50, FW1020.00 through FW1020.30, and FW1030.00 through FW1030.10 could allow a local attacker with control a partition that has been assigned SRIOV virtual function (VF) to cause a denial of service to a peer partition or arbitrary data corruption. IBM X-Force ID: 253175." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253175", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/6997133", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31842.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31842.json index 78db82ad7ba..c41901f710d 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31842.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31842.json @@ -2,19 +2,74 @@ "id": "CVE-2023-31842", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T13:15:11.003", - "lastModified": "2023-05-15T13:26:09.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T14:51:14.240", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/index.php?page=edit_faculty&id=." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2433CE4C-87DF-4B90-A449-C844403740C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31843.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31843.json index ebc93fe6bb0..5b01892bcfd 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31843.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31843.json @@ -2,19 +2,74 @@ "id": "CVE-2023-31843", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T13:15:11.043", - "lastModified": "2023-05-15T13:26:09.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T14:51:02.440", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/view_faculty.php?id=." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2433CE4C-87DF-4B90-A449-C844403740C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31844.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31844.json index a857738106b..723f1d3bb92 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31844.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31844.json @@ -2,19 +2,74 @@ "id": "CVE-2023-31844", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T13:15:11.087", - "lastModified": "2023-05-15T13:26:09.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T14:50:41.410", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/manage_subject.php?id=." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2433CE4C-87DF-4B90-A449-C844403740C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-3.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31845.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31845.json index 1f0ff772878..bdebd00d65e 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31845.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31845.json @@ -2,19 +2,74 @@ "id": "CVE-2023-31845", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T13:15:11.127", - "lastModified": "2023-05-15T13:26:09.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-23T14:50:03.040", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/manage_class.php?id=." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2433CE4C-87DF-4B90-A449-C844403740C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-4.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33359.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33359.json new file mode 100644 index 00000000000..39323a49a45 --- /dev/null +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33359.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33359", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-23T14:15:09.813", + "lastModified": "2023-05-23T14:18:11.573", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Piwigo 13.6.0 is vulnerable to Cross Site Request Forgery (CSRF) in the \"add tags\" function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Piwigo/Piwigo/issues/1908", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33361.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33361.json new file mode 100644 index 00000000000..eba80c05973 --- /dev/null +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33361.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33361", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-23T14:15:09.863", + "lastModified": "2023-05-23T14:18:11.573", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Piwigo 13.6.0 is vulnerable to SQL Injection via /admin/permalinks.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Piwigo/Piwigo/issues/1910", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33362.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33362.json new file mode 100644 index 00000000000..2d10fad6155 --- /dev/null +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33362.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33362", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-23T14:15:09.917", + "lastModified": "2023-05-23T14:18:11.573", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Piwigo 13.6.0 is vulnerable to SQL Injection via in the \"profile\" function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Piwigo/Piwigo/issues/1911", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33599.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33599.json new file mode 100644 index 00000000000..6865c6f44cb --- /dev/null +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33599.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33599", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-23T15:15:09.343", + "lastModified": "2023-05-23T15:15:09.343", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "EasyImages2.0 ? 2.8.1 is vulnerable to Cross Site Scripting (XSS) via viewlog.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/icret/EasyImages2.0/issues/115", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-336xx/CVE-2023-33617.json b/CVE-2023/CVE-2023-336xx/CVE-2023-33617.json new file mode 100644 index 00000000000..8e1658ba153 --- /dev/null +++ b/CVE-2023/CVE-2023-336xx/CVE-2023-33617.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33617", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-23T15:15:09.403", + "lastModified": "2023-05-23T15:15:09.403", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An OS Command Injection vulnerability in Parks Fiberlink 210 firmware version V2.1.14_X000 was found via the /boaform/admin/formPing target_addr parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/gbrls/58a5032bc58510abb908386124d1b4d2", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index a2f1f7fbef3..fed5dfd7241 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-23T14:00:32.463747+00:00 +2023-05-23T16:00:29.409474+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-23T13:55:46.380000+00:00 +2023-05-23T15:59:19.260000+00:00 ``` ### Last Data Feed Release @@ -29,52 +29,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -215843 +215857 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `14` -* [CVE-2023-31669](CVE-2023/CVE-2023-316xx/CVE-2023-31669.json) (`2023-05-23T12:15:09.173`) -* [CVE-2023-2483](CVE-2023/CVE-2023-24xx/CVE-2023-2483.json) (`2023-05-23T13:15:09.783`) -* [CVE-2023-23706](CVE-2023/CVE-2023-237xx/CVE-2023-23706.json) (`2023-05-23T13:15:09.410`) -* [CVE-2023-23724](CVE-2023/CVE-2023-237xx/CVE-2023-23724.json) (`2023-05-23T13:15:09.487`) -* [CVE-2023-25472](CVE-2023/CVE-2023-254xx/CVE-2023-25472.json) (`2023-05-23T13:15:09.563`) -* [CVE-2023-25481](CVE-2023/CVE-2023-254xx/CVE-2023-25481.json) (`2023-05-23T13:15:09.637`) -* [CVE-2023-25707](CVE-2023/CVE-2023-257xx/CVE-2023-25707.json) (`2023-05-23T13:15:09.707`) -* [CVE-2023-33338](CVE-2023/CVE-2023-333xx/CVE-2023-33338.json) (`2023-05-23T13:15:09.887`) +* [CVE-2022-46851](CVE-2022/CVE-2022-468xx/CVE-2022-46851.json) (`2023-05-23T14:15:09.277`) +* [CVE-2022-46853](CVE-2022/CVE-2022-468xx/CVE-2022-46853.json) (`2023-05-23T14:15:09.410`) +* [CVE-2022-46813](CVE-2022/CVE-2022-468xx/CVE-2022-46813.json) (`2023-05-23T15:15:09.107`) +* [CVE-2023-23705](CVE-2023/CVE-2023-237xx/CVE-2023-23705.json) (`2023-05-23T14:15:09.507`) +* [CVE-2023-23713](CVE-2023/CVE-2023-237xx/CVE-2023-23713.json) (`2023-05-23T14:15:09.577`) +* [CVE-2023-25056](CVE-2023/CVE-2023-250xx/CVE-2023-25056.json) (`2023-05-23T14:15:09.657`) +* [CVE-2023-30440](CVE-2023/CVE-2023-304xx/CVE-2023-30440.json) (`2023-05-23T14:15:09.733`) +* [CVE-2023-33359](CVE-2023/CVE-2023-333xx/CVE-2023-33359.json) (`2023-05-23T14:15:09.813`) +* [CVE-2023-33361](CVE-2023/CVE-2023-333xx/CVE-2023-33361.json) (`2023-05-23T14:15:09.863`) +* [CVE-2023-33362](CVE-2023/CVE-2023-333xx/CVE-2023-33362.json) (`2023-05-23T14:15:09.917`) +* [CVE-2023-26011](CVE-2023/CVE-2023-260xx/CVE-2023-26011.json) (`2023-05-23T15:15:09.190`) +* [CVE-2023-26014](CVE-2023/CVE-2023-260xx/CVE-2023-26014.json) (`2023-05-23T15:15:09.263`) +* [CVE-2023-33599](CVE-2023/CVE-2023-335xx/CVE-2023-33599.json) (`2023-05-23T15:15:09.343`) +* [CVE-2023-33617](CVE-2023/CVE-2023-336xx/CVE-2023-33617.json) (`2023-05-23T15:15:09.403`) ### CVEs modified in the last Commit -Recently modified CVEs: `102` +Recently modified CVEs: `29` -* [CVE-2023-2504](CVE-2023/CVE-2023-25xx/CVE-2023-2504.json) (`2023-05-23T13:04:39.657`) -* [CVE-2023-2505](CVE-2023/CVE-2023-25xx/CVE-2023-2505.json) (`2023-05-23T13:04:39.657`) -* [CVE-2023-25440](CVE-2023/CVE-2023-254xx/CVE-2023-25440.json) (`2023-05-23T13:04:39.657`) -* [CVE-2023-27068](CVE-2023/CVE-2023-270xx/CVE-2023-27068.json) (`2023-05-23T13:04:39.657`) -* [CVE-2023-29919](CVE-2023/CVE-2023-299xx/CVE-2023-29919.json) (`2023-05-23T13:04:39.657`) -* [CVE-2023-31664](CVE-2023/CVE-2023-316xx/CVE-2023-31664.json) (`2023-05-23T13:04:39.657`) -* [CVE-2023-31670](CVE-2023/CVE-2023-316xx/CVE-2023-31670.json) (`2023-05-23T13:04:39.657`) -* [CVE-2023-31708](CVE-2023/CVE-2023-317xx/CVE-2023-31708.json) (`2023-05-23T13:04:39.657`) -* [CVE-2023-31740](CVE-2023/CVE-2023-317xx/CVE-2023-31740.json) (`2023-05-23T13:04:39.657`) -* [CVE-2023-27066](CVE-2023/CVE-2023-270xx/CVE-2023-27066.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-31742](CVE-2023/CVE-2023-317xx/CVE-2023-31742.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-2837](CVE-2023/CVE-2023-28xx/CVE-2023-2837.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-2838](CVE-2023/CVE-2023-28xx/CVE-2023-2838.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-2839](CVE-2023/CVE-2023-28xx/CVE-2023-2839.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-2840](CVE-2023/CVE-2023-28xx/CVE-2023-2840.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-27067](CVE-2023/CVE-2023-270xx/CVE-2023-27067.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-28467](CVE-2023/CVE-2023-284xx/CVE-2023-28467.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-31584](CVE-2023/CVE-2023-315xx/CVE-2023-31584.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-28386](CVE-2023/CVE-2023-283xx/CVE-2023-28386.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-28412](CVE-2023/CVE-2023-284xx/CVE-2023-28412.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-28649](CVE-2023/CVE-2023-286xx/CVE-2023-28649.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-29838](CVE-2023/CVE-2023-298xx/CVE-2023-29838.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-31193](CVE-2023/CVE-2023-311xx/CVE-2023-31193.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-31240](CVE-2023/CVE-2023-312xx/CVE-2023-31240.json) (`2023-05-23T13:04:43.693`) -* [CVE-2023-33203](CVE-2023/CVE-2023-332xx/CVE-2023-33203.json) (`2023-05-23T13:15:09.837`) +* [CVE-2016-10878](CVE-2016/CVE-2016-108xx/CVE-2016-10878.json) (`2023-05-23T15:11:16.463`) +* [CVE-2020-9334](CVE-2020/CVE-2020-93xx/CVE-2020-9334.json) (`2023-05-23T14:22:22.827`) +* [CVE-2020-11514](CVE-2020/CVE-2020-115xx/CVE-2020-11514.json) (`2023-05-23T14:57:32.420`) +* [CVE-2020-11515](CVE-2020/CVE-2020-115xx/CVE-2020-11515.json) (`2023-05-23T14:57:32.420`) +* [CVE-2022-43507](CVE-2022/CVE-2022-435xx/CVE-2022-43507.json) (`2023-05-23T14:20:04.157`) +* [CVE-2022-46279](CVE-2022/CVE-2022-462xx/CVE-2022-46279.json) (`2023-05-23T14:21:58.433`) +* [CVE-2022-43474](CVE-2022/CVE-2022-434xx/CVE-2022-43474.json) (`2023-05-23T14:29:33.257`) +* [CVE-2022-41801](CVE-2022/CVE-2022-418xx/CVE-2022-41801.json) (`2023-05-23T14:33:44.353`) +* [CVE-2022-36376](CVE-2022/CVE-2022-363xx/CVE-2022-36376.json) (`2023-05-23T14:57:32.420`) +* [CVE-2022-41769](CVE-2022/CVE-2022-417xx/CVE-2022-41769.json) (`2023-05-23T15:02:51.017`) +* [CVE-2022-41693](CVE-2022/CVE-2022-416xx/CVE-2022-41693.json) (`2023-05-23T15:29:10.507`) +* [CVE-2022-41690](CVE-2022/CVE-2022-416xx/CVE-2022-41690.json) (`2023-05-23T15:34:58.283`) +* [CVE-2022-41687](CVE-2022/CVE-2022-416xx/CVE-2022-41687.json) (`2023-05-23T15:35:37.740`) +* [CVE-2022-41610](CVE-2022/CVE-2022-416xx/CVE-2022-41610.json) (`2023-05-23T15:40:00.390`) +* [CVE-2022-4774](CVE-2022/CVE-2022-47xx/CVE-2022-4774.json) (`2023-05-23T15:42:56.457`) +* [CVE-2022-41628](CVE-2022/CVE-2022-416xx/CVE-2022-41628.json) (`2023-05-23T15:59:19.260`) +* [CVE-2023-31845](CVE-2023/CVE-2023-318xx/CVE-2023-31845.json) (`2023-05-23T14:50:03.040`) +* [CVE-2023-31844](CVE-2023/CVE-2023-318xx/CVE-2023-31844.json) (`2023-05-23T14:50:41.410`) +* [CVE-2023-31843](CVE-2023/CVE-2023-318xx/CVE-2023-31843.json) (`2023-05-23T14:51:02.440`) +* [CVE-2023-31842](CVE-2023/CVE-2023-318xx/CVE-2023-31842.json) (`2023-05-23T14:51:14.240`) +* [CVE-2023-23878](CVE-2023/CVE-2023-238xx/CVE-2023-23878.json) (`2023-05-23T15:11:16.463`) +* [CVE-2023-28473](CVE-2023/CVE-2023-284xx/CVE-2023-28473.json) (`2023-05-23T15:38:06.487`) +* [CVE-2023-0233](CVE-2023/CVE-2023-02xx/CVE-2023-0233.json) (`2023-05-23T15:43:28.077`) +* [CVE-2023-0490](CVE-2023/CVE-2023-04xx/CVE-2023-0490.json) (`2023-05-23T15:43:58.993`) +* [CVE-2023-0520](CVE-2023/CVE-2023-05xx/CVE-2023-0520.json) (`2023-05-23T15:45:27.587`) ## Download and Usage