This is not the latest report. Click
here to view the latest report.
CVSS v3.1 Statistics for Patchstack as of 08/22/2023
1292
320
40
276
Reference
0-69.9%
|
Contributor |
86.3
Contributor
70-94.9%
Provider
95-100%
CVE | CNA Value | Alignment | NIST Value | Reason |
---|---|---|---|---|
CVE-2022-27861 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) None | ≠ | Integrity (I) Low | Integrity impact appears non-critical | |
Availability (A) None | Availability (A) None | |||
CVE-2023-23828 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-23900 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-24391 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-24393 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-26530 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-28533 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-28535 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-28622 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | ≠ | Privileges Required (PR) Low | Attacker as "user" is mentioned, but not identified as high privileges | |
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-28693 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-28779 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-28783 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | ≠ | Privileges Required (PR) Low | Attacker as "user" is mentioned, but not identified as high privileges | |
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-29097 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30475 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30477 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30481 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30483 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30489 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30498 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30747 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30749 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30751 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30752 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30754 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30778 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30874 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30876 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-30877 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-31071 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-31074 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-31076 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-31079 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-31091 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-34374 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-36530 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-37388 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-37983 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) Low | Privileges Required (PR) Low | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-37988 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-38397 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) High | Privileges Required (PR) High | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified | |
CVE-2023-39314 (7 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
Privileges Required (PR) None | Privileges Required (PR) None | |||
User Interaction (UI) Required | User Interaction (UI) Required | |||
Scope (S) Changed | Scope (S) Changed | |||
Confidentiality (C) Low | Confidentiality (C) Low | |||
Integrity (I) Low | Integrity (I) Low | |||
Availability (A) Low | ≠ | Availability (A) None | No availability impacts identified |