"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-11-16 08:00:34 +00:00
parent 5615e6f253
commit 1f7fa1a707
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
4 changed files with 436 additions and 12 deletions

View File

@ -1,17 +1,93 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-44296",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@dell.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "\nDell ELab-Navigator, version 3.1.9 contains a hard-coded credential vulnerability. A local attacker could potentially exploit this vulnerability, leading to unauthorized access to sensitive data. Successful exploitation may result in the compromise of confidential user information.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-798: Use of Hard-coded Credentials",
"cweId": "CWE-798"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Dell",
"product": {
"product_data": [
{
"product_name": "Mobility - E-Lab Navigator",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Versions 3.1.8 and 3.1.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000219558/dsa-2023-419-security-update-for-mobility-e-lab-navigator-vulnerabilities",
"refsource": "MISC",
"name": "https://www.dell.com/support/kbdoc/en-us/000219558/dsa-2023-419-security-update-for-mobility-e-lab-navigator-vulnerabilities"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "testingforbugs00"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,182 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47213",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "First Corporation's DVRs use a hard-coded password, which may allow a remote unauthenticated attacker to rewrite or obtain the configuration information of the affected device. Note that updates are provided only for Late model of CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB, and MD-808AB. As for the other products, apply the workaround."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use of hard-coded password"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "First Co., Ltd.",
"product": {
"product_data": [
{
"product_name": "CFR-904E, CFR-908E, CFR-916E",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "CFR-4EHD, CFR-8EHD, CFR-16EHD",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "CFR-4EHA, CFR-8EHA, CFR-16EHA",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "CFR-4EAAM, CFR-4EABC",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "CFR-4EAA, CFR-8EAA, CFR-16EAA",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "CFR-4EAB, CFR-8EAB, CFR-16EAB",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "CFR-1004EA, CFR-1008EA, CFR-1016EA",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "MD-404HD, MD-808HD",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "MD-404HA, MD-808HA",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "MD-404AA, MD-808AA",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "MD-404AB, MD-808AB",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.c-first.co.jp/information/ddososhirase/",
"refsource": "MISC",
"name": "https://www.c-first.co.jp/information/ddososhirase/"
},
{
"url": "https://www.c-first.co.jp/wp/wp-content/uploads/2023/11/tuushin.pdf",
"refsource": "MISC",
"name": "https://www.c-first.co.jp/wp/wp-content/uploads/2023/11/tuushin.pdf"
},
{
"url": "https://jvn.jp/en/vu/JVNVU99077347/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU99077347/"
}
]
}

View File

@ -1,17 +1,182 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47674",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Missing authentication for critical function vulnerability in First Corporation's DVRs allows a remote unauthenticated attacker to rewrite or obtain the configuration information of the affected device. Note that updates are provided only for Late model of CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB, and MD-808AB. As for the other products, apply the workaround."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Missing authentication for critical function"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "First Co., Ltd.",
"product": {
"product_data": [
{
"product_name": "CFR-904E, CFR-908E, CFR-916E",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "CFR-4EHD, CFR-8EHD, CFR-16EHD",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "CFR-4EHA, CFR-8EHA, CFR-16EHA",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "CFR-4EAAM, CFR-4EABC",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "CFR-4EAA, CFR-8EAA, CFR-16EAA",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "CFR-4EAB, CFR-8EAB, CFR-16EAB",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "CFR-1004EA, CFR-1008EA, CFR-1016EA",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "MD-404HD, MD-808HD",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "MD-404HA, MD-808HA",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "MD-404AA, MD-808AA",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
},
{
"product_name": "MD-404AB, MD-808AB",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "firmware all versions"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.c-first.co.jp/information/ddososhirase/",
"refsource": "MISC",
"name": "https://www.c-first.co.jp/information/ddososhirase/"
},
{
"url": "https://www.c-first.co.jp/wp/wp-content/uploads/2023/11/tuushin.pdf",
"refsource": "MISC",
"name": "https://www.c-first.co.jp/wp/wp-content/uploads/2023/11/tuushin.pdf"
},
{
"url": "https://jvn.jp/en/vu/JVNVU99077347/",
"refsource": "MISC",
"name": "https://jvn.jp/en/vu/JVNVU99077347/"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-6173",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}