mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-09-05T14:00:25.738677+00:00
This commit is contained in:
parent
023c8e6ca4
commit
04d2d700ab
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-33220",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:11.847",
|
||||
"lastModified": "2023-09-05T07:15:11.847",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:56.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-33275",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:11.983",
|
||||
"lastModified": "2023-09-05T07:15:11.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:56.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-40524",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:12.073",
|
||||
"lastModified": "2023-09-05T07:15:12.073",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:56.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-40534",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:12.157",
|
||||
"lastModified": "2023-09-05T07:15:12.157",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:56.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2022/CVE-2022-417xx/CVE-2022-41763.json
Normal file
20
CVE-2022/CVE-2022-417xx/CVE-2022-41763.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-41763",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-05T13:15:07.717",
|
||||
"lastModified": "2023-09-05T13:33:34.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in NOKIA AMS 9.7.05. Remote Code Execution exists via the debugger of the ipAddress variable. A remote user, authenticated to the AMS server, could inject code in the PING function. The privileges of the command executed depend on the user that runs the service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20897",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2023-09-05T11:15:32.973",
|
||||
"lastModified": "2023-09-05T11:15:32.973",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20898",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2023-09-05T11:15:33.300",
|
||||
"lastModified": "2023-09-05T11:15:33.300",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21636",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:12.247",
|
||||
"lastModified": "2023-09-05T07:15:12.247",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:56.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21644",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:12.327",
|
||||
"lastModified": "2023-09-05T07:15:12.327",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:56.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21646",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:12.410",
|
||||
"lastModified": "2023-09-05T07:15:12.410",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:56.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21653",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:12.490",
|
||||
"lastModified": "2023-09-05T07:15:12.490",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:56.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21654",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:12.570",
|
||||
"lastModified": "2023-09-05T07:15:12.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21655",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:12.697",
|
||||
"lastModified": "2023-09-05T07:15:12.697",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21662",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:12.780",
|
||||
"lastModified": "2023-09-05T07:15:12.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21663",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:12.863",
|
||||
"lastModified": "2023-09-05T07:15:12.863",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21664",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:12.940",
|
||||
"lastModified": "2023-09-05T07:15:12.940",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21667",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:13.020",
|
||||
"lastModified": "2023-09-05T07:15:13.020",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28538",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:13.113",
|
||||
"lastModified": "2023-09-05T07:15:13.113",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28543",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:13.197",
|
||||
"lastModified": "2023-09-05T07:15:13.197",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28544",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:13.280",
|
||||
"lastModified": "2023-09-05T07:15:13.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28548",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:13.360",
|
||||
"lastModified": "2023-09-05T07:15:13.360",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28549",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:13.437",
|
||||
"lastModified": "2023-09-05T07:15:13.437",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28557",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:13.517",
|
||||
"lastModified": "2023-09-05T07:15:13.517",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28558",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:13.603",
|
||||
"lastModified": "2023-09-05T07:15:13.603",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28559",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:13.687",
|
||||
"lastModified": "2023-09-05T07:15:13.687",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28560",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:13.763",
|
||||
"lastModified": "2023-09-05T07:15:13.763",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28562",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:13.843",
|
||||
"lastModified": "2023-09-05T07:15:13.843",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28564",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:13.923",
|
||||
"lastModified": "2023-09-05T07:15:13.923",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28565",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:14.000",
|
||||
"lastModified": "2023-09-05T07:15:14.000",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28567",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:14.083",
|
||||
"lastModified": "2023-09-05T07:15:14.083",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28573",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:14.167",
|
||||
"lastModified": "2023-09-05T07:15:14.167",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:51.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28581",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:14.247",
|
||||
"lastModified": "2023-09-05T07:15:14.247",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28584",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:14.323",
|
||||
"lastModified": "2023-09-05T07:15:14.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,31 +2,101 @@
|
||||
"id": "CVE-2023-31714",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-30T22:15:08.013",
|
||||
"lastModified": "2023-08-31T10:02:10.690",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-05T12:29:00.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Chitor-CMS before v1.1.2 was discovered to contain multiple SQL injection vulnerabilities."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto que Chitor-CMS antes de la versi\u00f3n 1.1.2 contiene m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:waqaskanju:chitor-cms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.1.2",
|
||||
"matchCriteriaId": "7A9BA737-3DCE-4D63-AE63-EEF6C64FE9A7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/msd0pe-1/chitor-sqli",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/waqaskanju/Chitor-CMS/commit/69d34420ad382c91b0c285432418c1b0810128c1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/waqaskanju/Chitor-CMS/releases/tag/Chitor-cms",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/51383",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33015",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:14.407",
|
||||
"lastModified": "2023-09-05T07:15:14.407",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33016",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:14.487",
|
||||
"lastModified": "2023-09-05T07:15:14.487",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33019",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:14.560",
|
||||
"lastModified": "2023-09-05T07:15:14.560",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33020",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:14.640",
|
||||
"lastModified": "2023-09-05T07:15:14.640",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33021",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-09-05T07:15:14.717",
|
||||
"lastModified": "2023-09-05T07:15:14.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3489",
|
||||
"sourceIdentifier": "sirt@brocade.com",
|
||||
"published": "2023-08-31T00:15:07.913",
|
||||
"lastModified": "2023-08-31T10:02:10.690",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-05T12:46:37.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "sirt@brocade.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "sirt@brocade.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:9.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F3045B8-D0C4-47D8-8EBB-F96B1DBBA1DC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22510",
|
||||
"source": "sirt@brocade.com"
|
||||
"source": "sirt@brocade.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36492",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-05T10:15:07.463",
|
||||
"lastModified": "2023-09-05T10:15:07.463",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38569",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-05T10:15:07.643",
|
||||
"lastModified": "2023-09-05T10:15:07.643",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38574",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-05T09:15:08.037",
|
||||
"lastModified": "2023-09-05T09:15:08.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39448",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-05T09:15:08.803",
|
||||
"lastModified": "2023-09-05T09:15:08.803",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39938",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-05T09:15:09.053",
|
||||
"lastModified": "2023-09-05T09:15:09.053",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40535",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-05T09:15:09.213",
|
||||
"lastModified": "2023-09-05T09:15:09.213",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40582",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-30T18:15:09.783",
|
||||
"lastModified": "2023-08-31T10:02:10.690",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-09-05T12:57:14.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,14 +66,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:find-exec_project:find-exec:*:*:*:*:*:node.js:*:*",
|
||||
"versionEndExcluding": "1.0.3",
|
||||
"matchCriteriaId": "9D212061-F058-4CB9-A96E-23856D97B658"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/shime/find-exec/commit/74fb108097c229b03d6dba4cce81e36aa364b51c",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40705",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-05T09:15:09.340",
|
||||
"lastModified": "2023-09-05T09:15:09.340",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41908",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-05T07:15:14.810",
|
||||
"lastModified": "2023-09-05T07:15:14.810",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41909",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-05T07:15:14.877",
|
||||
"lastModified": "2023-09-05T07:15:14.877",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41910",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-05T07:15:14.927",
|
||||
"lastModified": "2023-09-05T07:15:14.927",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-4540",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2023-09-05T08:15:40.017",
|
||||
"lastModified": "2023-09-05T08:15:40.017",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-09-05T12:54:46.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator HTTP Library for Lua allows Excessive Allocation.This issue affects HTTP Library for Lua: before commit ddab283.\n\n"
|
||||
"value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator lua-http library allows Excessive Allocation and a denial of service (DoS) attack to be executed by sending a properly crafted request to the server. \n\nThis issue affects lua-http: all versions before commit ddab283."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -24,6 +24,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/posts/2023/09/CVE-2023-4540/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/daurnimator/lua-http/commit/ddab2835c583d45dec62680ca8d3cbde55e0bae6",
|
||||
"source": "cvd@cert.pl"
|
||||
|
41
README.md
41
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-05T12:00:25.321378+00:00
|
||||
2023-09-05T14:00:25.738677+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-05T11:43:01.273000+00:00
|
||||
2023-09-05T13:33:34.903000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,24 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
224191
|
||||
224192
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2023-36492](CVE-2023/CVE-2023-364xx/CVE-2023-36492.json) (`2023-09-05T10:15:07.463`)
|
||||
* [CVE-2023-38569](CVE-2023/CVE-2023-385xx/CVE-2023-38569.json) (`2023-09-05T10:15:07.643`)
|
||||
* [CVE-2023-20897](CVE-2023/CVE-2023-208xx/CVE-2023-20897.json) (`2023-09-05T11:15:32.973`)
|
||||
* [CVE-2023-20898](CVE-2023/CVE-2023-208xx/CVE-2023-20898.json) (`2023-09-05T11:15:33.300`)
|
||||
* [CVE-2022-41763](CVE-2022/CVE-2022-417xx/CVE-2022-41763.json) (`2023-09-05T13:15:07.717`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `51`
|
||||
|
||||
* [CVE-2022-43151](CVE-2022/CVE-2022-431xx/CVE-2022-43151.json) (`2023-09-05T11:43:01.273`)
|
||||
* [CVE-2023-21654](CVE-2023/CVE-2023-216xx/CVE-2023-21654.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-21655](CVE-2023/CVE-2023-216xx/CVE-2023-21655.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-21662](CVE-2023/CVE-2023-216xx/CVE-2023-21662.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-21663](CVE-2023/CVE-2023-216xx/CVE-2023-21663.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-21664](CVE-2023/CVE-2023-216xx/CVE-2023-21664.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-21667](CVE-2023/CVE-2023-216xx/CVE-2023-21667.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28538](CVE-2023/CVE-2023-285xx/CVE-2023-28538.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28543](CVE-2023/CVE-2023-285xx/CVE-2023-28543.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28544](CVE-2023/CVE-2023-285xx/CVE-2023-28544.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28548](CVE-2023/CVE-2023-285xx/CVE-2023-28548.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28549](CVE-2023/CVE-2023-285xx/CVE-2023-28549.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28557](CVE-2023/CVE-2023-285xx/CVE-2023-28557.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28558](CVE-2023/CVE-2023-285xx/CVE-2023-28558.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28559](CVE-2023/CVE-2023-285xx/CVE-2023-28559.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28560](CVE-2023/CVE-2023-285xx/CVE-2023-28560.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28562](CVE-2023/CVE-2023-285xx/CVE-2023-28562.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28564](CVE-2023/CVE-2023-285xx/CVE-2023-28564.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28565](CVE-2023/CVE-2023-285xx/CVE-2023-28565.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28567](CVE-2023/CVE-2023-285xx/CVE-2023-28567.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-28573](CVE-2023/CVE-2023-285xx/CVE-2023-28573.json) (`2023-09-05T12:54:51.627`)
|
||||
* [CVE-2023-21636](CVE-2023/CVE-2023-216xx/CVE-2023-21636.json) (`2023-09-05T12:54:56.227`)
|
||||
* [CVE-2023-21644](CVE-2023/CVE-2023-216xx/CVE-2023-21644.json) (`2023-09-05T12:54:56.227`)
|
||||
* [CVE-2023-21646](CVE-2023/CVE-2023-216xx/CVE-2023-21646.json) (`2023-09-05T12:54:56.227`)
|
||||
* [CVE-2023-21653](CVE-2023/CVE-2023-216xx/CVE-2023-21653.json) (`2023-09-05T12:54:56.227`)
|
||||
* [CVE-2023-40582](CVE-2023/CVE-2023-405xx/CVE-2023-40582.json) (`2023-09-05T12:57:14.317`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user