diff --git a/2023/24xxx/CVE-2023-24881.json b/2023/24xxx/CVE-2023-24881.json index 679e61e8b0a..1c6babdc944 100644 --- a/2023/24xxx/CVE-2023-24881.json +++ b/2023/24xxx/CVE-2023-24881.json @@ -65,7 +65,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C" } diff --git a/2023/24xxx/CVE-2023-24900.json b/2023/24xxx/CVE-2023-24900.json index 5fc39ef260d..fdde798e6d5 100644 --- a/2023/24xxx/CVE-2023-24900.json +++ b/2023/24xxx/CVE-2023-24900.json @@ -317,7 +317,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "baseScore": 5.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C" } diff --git a/2023/24xxx/CVE-2023-24903.json b/2023/24xxx/CVE-2023-24903.json index cc1f1ebdb71..72594479473 100644 --- a/2023/24xxx/CVE-2023-24903.json +++ b/2023/24xxx/CVE-2023-24903.json @@ -317,7 +317,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "CRITICAL", + "baseSeverity": "HIGH", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C" } diff --git a/2023/24xxx/CVE-2023-24932.json b/2023/24xxx/CVE-2023-24932.json index 58e7533261b..e5343f81a7a 100644 --- a/2023/24xxx/CVE-2023-24932.json +++ b/2023/24xxx/CVE-2023-24932.json @@ -317,7 +317,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "baseScore": 6.7, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C" } diff --git a/2023/24xxx/CVE-2023-24944.json b/2023/24xxx/CVE-2023-24944.json index 8294e03b4fc..d4831fb0c51 100644 --- a/2023/24xxx/CVE-2023-24944.json +++ b/2023/24xxx/CVE-2023-24944.json @@ -161,7 +161,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C" } diff --git a/2023/24xxx/CVE-2023-24945.json b/2023/24xxx/CVE-2023-24945.json index a8bf3026243..5c83663c906 100644 --- a/2023/24xxx/CVE-2023-24945.json +++ b/2023/24xxx/CVE-2023-24945.json @@ -317,7 +317,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C" } diff --git a/2023/24xxx/CVE-2023-24950.json b/2023/24xxx/CVE-2023-24950.json index 590fdb0d491..1daa5c429a4 100644 --- a/2023/24xxx/CVE-2023-24950.json +++ b/2023/24xxx/CVE-2023-24950.json @@ -89,7 +89,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C" } diff --git a/2023/24xxx/CVE-2023-24954.json b/2023/24xxx/CVE-2023-24954.json index 4d88c1261fa..1c99518dd96 100644 --- a/2023/24xxx/CVE-2023-24954.json +++ b/2023/24xxx/CVE-2023-24954.json @@ -89,7 +89,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C" } diff --git a/2023/24xxx/CVE-2023-24955.json b/2023/24xxx/CVE-2023-24955.json index d908579352d..54c7b674e91 100644 --- a/2023/24xxx/CVE-2023-24955.json +++ b/2023/24xxx/CVE-2023-24955.json @@ -89,7 +89,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "CRITICAL", + "baseSeverity": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C" } diff --git a/2023/27xxx/CVE-2023-27312.json b/2023/27xxx/CVE-2023-27312.json index 1429f2da5c3..9a2cbcdec04 100644 --- a/2023/27xxx/CVE-2023-27312.json +++ b/2023/27xxx/CVE-2023-27312.json @@ -1,17 +1,89 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-27312", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@netapp.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SnapCenter Plugin for VMware vSphere versions 4.6 prior to 4.9 are \nsusceptible to a vulnerability which may allow authenticated \nunprivileged users to modify email and snapshot name settings within the\n VMware vSphere user interface.\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-250", + "cweId": "CWE-250" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NetApp", + "product": { + "product_data": [ + { + "product_name": "SnapCenter Plugin for VMware vSphere", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "4.6", + "version_value": "4.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.netapp.com/advisory/ntap-20230713-0001/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230713-0001/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "NTAP-20230713-0001", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2023/27xxx/CVE-2023-27313.json b/2023/27xxx/CVE-2023-27313.json index 92d8ac352cf..36c0ab2caf8 100644 --- a/2023/27xxx/CVE-2023-27313.json +++ b/2023/27xxx/CVE-2023-27313.json @@ -1,17 +1,89 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-27313", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@netapp.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SnapCenter versions 3.x and 4.x prior to 4.9 are susceptible to a \nvulnerability which may allow an authenticated unprivileged user to gain\n access as an admin user.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-250", + "cweId": "CWE-250" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NetApp", + "product": { + "product_data": [ + { + "product_name": "SnapCenter", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.0", + "version_value": "4.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.netapp.com/advisory/ntap-20230713-0002/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20230713-0002/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "NTAP-20230713-0002", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/27xxx/CVE-2023-27314.json b/2023/27xxx/CVE-2023-27314.json index 8da6e0f0070..08e47ae7a81 100644 --- a/2023/27xxx/CVE-2023-27314.json +++ b/2023/27xxx/CVE-2023-27314.json @@ -1,17 +1,89 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-27314", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@netapp.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "ONTAP 9 versions prior to 9.8P19, 9.9.1P16, 9.10.1P12, 9.11.1P8, \n9.12.1P2 and 9.13.1 are susceptible to a vulnerability which could allow\n a remote unauthenticated attacker to cause a crash of the HTTP service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400 Uncontrolled Resource Consumption", + "cweId": "CWE-400" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NetApp", + "product": { + "product_data": [ + { + "product_name": "ONTAP 9", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "9.8P19, 9.9.1P16, 9.10.1P12, 9.11.1P8, 9.12.1P2, 9.13.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.netapp.com/advisory/ntap-20231009-0001/", + "refsource": "MISC", + "name": "https://security.netapp.com/advisory/ntap-20231009-0001/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "NTAP-20231009-0001", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2023/28xxx/CVE-2023-28251.json b/2023/28xxx/CVE-2023-28251.json index a10dffa5f81..526e29ff9af 100644 --- a/2023/28xxx/CVE-2023-28251.json +++ b/2023/28xxx/CVE-2023-28251.json @@ -317,7 +317,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C" } diff --git a/2023/28xxx/CVE-2023-28283.json b/2023/28xxx/CVE-2023-28283.json index 67a862ac050..e756920367f 100644 --- a/2023/28xxx/CVE-2023-28283.json +++ b/2023/28xxx/CVE-2023-28283.json @@ -317,7 +317,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "CRITICAL", + "baseSeverity": "HIGH", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C" } diff --git a/2023/28xxx/CVE-2023-28290.json b/2023/28xxx/CVE-2023-28290.json index 2bf6f9c327b..68dc50220ea 100644 --- a/2023/28xxx/CVE-2023-28290.json +++ b/2023/28xxx/CVE-2023-28290.json @@ -65,7 +65,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "baseScore": 5.3, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C" } diff --git a/2023/29xxx/CVE-2023-29324.json b/2023/29xxx/CVE-2023-29324.json index bcede5829c9..c6c4983a3d7 100644 --- a/2023/29xxx/CVE-2023-29324.json +++ b/2023/29xxx/CVE-2023-29324.json @@ -317,7 +317,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C" } diff --git a/2023/29xxx/CVE-2023-29325.json b/2023/29xxx/CVE-2023-29325.json index 64acbe0845b..07446527165 100644 --- a/2023/29xxx/CVE-2023-29325.json +++ b/2023/29xxx/CVE-2023-29325.json @@ -317,7 +317,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "CRITICAL", + "baseSeverity": "HIGH", "baseScore": 8.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C" } diff --git a/2023/29xxx/CVE-2023-29333.json b/2023/29xxx/CVE-2023-29333.json index 0cc69ea9015..439ada0388b 100644 --- a/2023/29xxx/CVE-2023-29333.json +++ b/2023/29xxx/CVE-2023-29333.json @@ -89,7 +89,7 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", + "baseSeverity": "LOW", "baseScore": 3.3, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C" } diff --git a/2023/29xxx/CVE-2023-29335.json b/2023/29xxx/CVE-2023-29335.json index 65bf2d53846..a432cbfe2a1 100644 --- a/2023/29xxx/CVE-2023-29335.json +++ b/2023/29xxx/CVE-2023-29335.json @@ -82,18 +82,6 @@ ] } }, - { - "product_name": "Microsoft Word 2013 RT Service Pack 1", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "15.0.1", - "version_value": "15.0.5553.1000" - } - ] - } - }, { "product_name": "Microsoft Word 2013 Service Pack 1", "version": { diff --git a/2023/29xxx/CVE-2023-29338.json b/2023/29xxx/CVE-2023-29338.json index 34fa8455db0..a87a37267ac 100644 --- a/2023/29xxx/CVE-2023-29338.json +++ b/2023/29xxx/CVE-2023-29338.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Visual Studio Code Information Disclosure Vulnerability" + "value": "Visual Studio Code Spoofing Vulnerability" } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "Spoofing" } ] } @@ -65,9 +65,9 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", - "baseScore": 5, - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C" + "baseSeverity": "MEDIUM", + "baseScore": 6.6, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C" } ] } diff --git a/2023/43xxx/CVE-2023-43148.json b/2023/43xxx/CVE-2023-43148.json index f3f785bb39f..efa49a781c1 100644 --- a/2023/43xxx/CVE-2023-43148.json +++ b/2023/43xxx/CVE-2023-43148.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-43148", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-43148", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SPA-Cart 1.9.0.3 has a Cross Site Request Forgery (CSRF) vulnerability that allows a remote attacker to delete all accounts." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/MinoTauro2020/CVE-2023-43148", + "url": "https://github.com/MinoTauro2020/CVE-2023-43148" } ] } diff --git a/2023/5xxx/CVE-2023-5562.json b/2023/5xxx/CVE-2023-5562.json new file mode 100644 index 00000000000..dafdb9b0bcd --- /dev/null +++ b/2023/5xxx/CVE-2023-5562.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-5562", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file