U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2022-23080

Change History

Initial Analysis by NIST 6/29/2022 12:38:37 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:rangerstudio:directus:9.0.0:beta10:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:beta11:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:beta12:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:beta13:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:beta14:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:beta2:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:beta3:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:beta4:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:beta5:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:beta7:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:beta8:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:beta9:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc0:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc1:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc10:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc100:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc101:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc11:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc12:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc13:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc14:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc15:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc17:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc18:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc19:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc2:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc20:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc21:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc22:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc23:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc24:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc25:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc26:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc27:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc28:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc29:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc3:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc30:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc31:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc32:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc33:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc34:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc35:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc36:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc37:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc38:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc39:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc4:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc40:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc41:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc42:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc43:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc44:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc45:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc46:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc47:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc48:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc49:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc5:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc50:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc51:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc52:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc53:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc54:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc55:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc56:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc57:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc58:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc59:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc6:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc60:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc61:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc62:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc63:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc64:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc65:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc66:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc67:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc68:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc69:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc7:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc70:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc71:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc72:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc73:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc74:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc75:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc76:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc77:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc78:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc79:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc8:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc80:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc81:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc82:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc83:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc84:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc85:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc86:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc87:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc88:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc89:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc9:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc90:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc91:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc92:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc93:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc94:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc95:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc96:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc97:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc98:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:9.0.0:rc99:*:*:*:*:*:*
     *cpe:2.3:a:rangerstudio:directus:*:*:*:*:*:*:*:* versions from (including) 9.0.1 up to (including) 9.6.0
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:L/Au:S/C:P/I:N/A:N)
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Changed Reference Type
https://github.com/directus/directus/commit/6da3f1ed5034115b1da00440008351bf0d808d83 No Types Assigned
https://github.com/directus/directus/commit/6da3f1ed5034115b1da00440008351bf0d808d83 Patch, Third Party Advisory
Changed Reference Type
https://www.mend.io/vulnerability-database/CVE-2022-23080 No Types Assigned
https://www.mend.io/vulnerability-database/CVE-2022-23080 Exploit, Third Party Advisory