Auto-Update: 2023-09-05T14:00:25.738677+00:00

This commit is contained in:
cad-safe-bot 2023-09-05 14:00:29 +00:00
parent 023c8e6ca4
commit 04d2d700ab
53 changed files with 330 additions and 121 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33220", "id": "CVE-2022-33220",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:11.847", "published": "2023-09-05T07:15:11.847",
"lastModified": "2023-09-05T07:15:11.847", "lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33275", "id": "CVE-2022-33275",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:11.983", "published": "2023-09-05T07:15:11.983",
"lastModified": "2023-09-05T07:15:11.983", "lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-40524", "id": "CVE-2022-40524",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.073", "published": "2023-09-05T07:15:12.073",
"lastModified": "2023-09-05T07:15:12.073", "lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-40534", "id": "CVE-2022-40534",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.157", "published": "2023-09-05T07:15:12.157",
"lastModified": "2023-09-05T07:15:12.157", "lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-41763",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-05T13:15:07.717",
"lastModified": "2023-09-05T13:33:34.903",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in NOKIA AMS 9.7.05. Remote Code Execution exists via the debugger of the ipAddress variable. A remote user, authenticated to the AMS server, could inject code in the PING function. The privileges of the command executed depend on the user that runs the service."
}
],
"metrics": {},
"references": [
{
"url": "https://www.gruppotim.it/it/footer/red-team.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20897", "id": "CVE-2023-20897",
"sourceIdentifier": "security@vmware.com", "sourceIdentifier": "security@vmware.com",
"published": "2023-09-05T11:15:32.973", "published": "2023-09-05T11:15:32.973",
"lastModified": "2023-09-05T11:15:32.973", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20898", "id": "CVE-2023-20898",
"sourceIdentifier": "security@vmware.com", "sourceIdentifier": "security@vmware.com",
"published": "2023-09-05T11:15:33.300", "published": "2023-09-05T11:15:33.300",
"lastModified": "2023-09-05T11:15:33.300", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21636", "id": "CVE-2023-21636",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.247", "published": "2023-09-05T07:15:12.247",
"lastModified": "2023-09-05T07:15:12.247", "lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21644", "id": "CVE-2023-21644",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.327", "published": "2023-09-05T07:15:12.327",
"lastModified": "2023-09-05T07:15:12.327", "lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21646", "id": "CVE-2023-21646",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.410", "published": "2023-09-05T07:15:12.410",
"lastModified": "2023-09-05T07:15:12.410", "lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21653", "id": "CVE-2023-21653",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.490", "published": "2023-09-05T07:15:12.490",
"lastModified": "2023-09-05T07:15:12.490", "lastModified": "2023-09-05T12:54:56.227",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21654", "id": "CVE-2023-21654",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.570", "published": "2023-09-05T07:15:12.570",
"lastModified": "2023-09-05T07:15:12.570", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21655", "id": "CVE-2023-21655",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.697", "published": "2023-09-05T07:15:12.697",
"lastModified": "2023-09-05T07:15:12.697", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21662", "id": "CVE-2023-21662",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.780", "published": "2023-09-05T07:15:12.780",
"lastModified": "2023-09-05T07:15:12.780", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21663", "id": "CVE-2023-21663",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.863", "published": "2023-09-05T07:15:12.863",
"lastModified": "2023-09-05T07:15:12.863", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21664", "id": "CVE-2023-21664",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:12.940", "published": "2023-09-05T07:15:12.940",
"lastModified": "2023-09-05T07:15:12.940", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21667", "id": "CVE-2023-21667",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.020", "published": "2023-09-05T07:15:13.020",
"lastModified": "2023-09-05T07:15:13.020", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28538", "id": "CVE-2023-28538",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.113", "published": "2023-09-05T07:15:13.113",
"lastModified": "2023-09-05T07:15:13.113", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28543", "id": "CVE-2023-28543",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.197", "published": "2023-09-05T07:15:13.197",
"lastModified": "2023-09-05T07:15:13.197", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28544", "id": "CVE-2023-28544",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.280", "published": "2023-09-05T07:15:13.280",
"lastModified": "2023-09-05T07:15:13.280", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28548", "id": "CVE-2023-28548",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.360", "published": "2023-09-05T07:15:13.360",
"lastModified": "2023-09-05T07:15:13.360", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28549", "id": "CVE-2023-28549",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.437", "published": "2023-09-05T07:15:13.437",
"lastModified": "2023-09-05T07:15:13.437", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28557", "id": "CVE-2023-28557",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.517", "published": "2023-09-05T07:15:13.517",
"lastModified": "2023-09-05T07:15:13.517", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28558", "id": "CVE-2023-28558",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.603", "published": "2023-09-05T07:15:13.603",
"lastModified": "2023-09-05T07:15:13.603", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28559", "id": "CVE-2023-28559",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.687", "published": "2023-09-05T07:15:13.687",
"lastModified": "2023-09-05T07:15:13.687", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28560", "id": "CVE-2023-28560",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.763", "published": "2023-09-05T07:15:13.763",
"lastModified": "2023-09-05T07:15:13.763", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28562", "id": "CVE-2023-28562",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.843", "published": "2023-09-05T07:15:13.843",
"lastModified": "2023-09-05T07:15:13.843", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28564", "id": "CVE-2023-28564",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:13.923", "published": "2023-09-05T07:15:13.923",
"lastModified": "2023-09-05T07:15:13.923", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28565", "id": "CVE-2023-28565",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.000", "published": "2023-09-05T07:15:14.000",
"lastModified": "2023-09-05T07:15:14.000", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28567", "id": "CVE-2023-28567",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.083", "published": "2023-09-05T07:15:14.083",
"lastModified": "2023-09-05T07:15:14.083", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28573", "id": "CVE-2023-28573",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.167", "published": "2023-09-05T07:15:14.167",
"lastModified": "2023-09-05T07:15:14.167", "lastModified": "2023-09-05T12:54:51.627",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28581", "id": "CVE-2023-28581",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.247", "published": "2023-09-05T07:15:14.247",
"lastModified": "2023-09-05T07:15:14.247", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28584", "id": "CVE-2023-28584",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.323", "published": "2023-09-05T07:15:14.323",
"lastModified": "2023-09-05T07:15:14.323", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,31 +2,101 @@
"id": "CVE-2023-31714", "id": "CVE-2023-31714",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-08-30T22:15:08.013", "published": "2023-08-30T22:15:08.013",
"lastModified": "2023-08-31T10:02:10.690", "lastModified": "2023-09-05T12:29:00.033",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Chitor-CMS before v1.1.2 was discovered to contain multiple SQL injection vulnerabilities." "value": "Chitor-CMS before v1.1.2 was discovered to contain multiple SQL injection vulnerabilities."
},
{
"lang": "es",
"value": "Se ha descubierto que Chitor-CMS antes de la versi\u00f3n 1.1.2 contiene m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:waqaskanju:chitor-cms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.2",
"matchCriteriaId": "7A9BA737-3DCE-4D63-AE63-EEF6C64FE9A7"
}
]
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://github.com/msd0pe-1/chitor-sqli", "url": "https://github.com/msd0pe-1/chitor-sqli",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/waqaskanju/Chitor-CMS/commit/69d34420ad382c91b0c285432418c1b0810128c1", "url": "https://github.com/waqaskanju/Chitor-CMS/commit/69d34420ad382c91b0c285432418c1b0810128c1",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/waqaskanju/Chitor-CMS/releases/tag/Chitor-cms", "url": "https://github.com/waqaskanju/Chitor-CMS/releases/tag/Chitor-cms",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}, },
{ {
"url": "https://www.exploit-db.com/exploits/51383", "url": "https://www.exploit-db.com/exploits/51383",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33015", "id": "CVE-2023-33015",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.407", "published": "2023-09-05T07:15:14.407",
"lastModified": "2023-09-05T07:15:14.407", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33016", "id": "CVE-2023-33016",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.487", "published": "2023-09-05T07:15:14.487",
"lastModified": "2023-09-05T07:15:14.487", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33019", "id": "CVE-2023-33019",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.560", "published": "2023-09-05T07:15:14.560",
"lastModified": "2023-09-05T07:15:14.560", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33020", "id": "CVE-2023-33020",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.640", "published": "2023-09-05T07:15:14.640",
"lastModified": "2023-09-05T07:15:14.640", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33021", "id": "CVE-2023-33021",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-09-05T07:15:14.717", "published": "2023-09-05T07:15:14.717",
"lastModified": "2023-09-05T07:15:14.717", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3489", "id": "CVE-2023-3489",
"sourceIdentifier": "sirt@brocade.com", "sourceIdentifier": "sirt@brocade.com",
"published": "2023-08-31T00:15:07.913", "published": "2023-08-31T00:15:07.913",
"lastModified": "2023-08-31T10:02:10.690", "lastModified": "2023-09-05T12:46:37.377",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -12,6 +12,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{ {
"source": "sirt@brocade.com", "source": "sirt@brocade.com",
"type": "Secondary", "type": "Secondary",
@ -35,6 +55,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
},
{ {
"source": "sirt@brocade.com", "source": "sirt@brocade.com",
"type": "Secondary", "type": "Secondary",
@ -46,10 +76,30 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:broadcom:fabric_operating_system:9.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F3045B8-D0C4-47D8-8EBB-F96B1DBBA1DC"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22510", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22510",
"source": "sirt@brocade.com" "source": "sirt@brocade.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36492", "id": "CVE-2023-36492",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T10:15:07.463", "published": "2023-09-05T10:15:07.463",
"lastModified": "2023-09-05T10:15:07.463", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38569", "id": "CVE-2023-38569",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T10:15:07.643", "published": "2023-09-05T10:15:07.643",
"lastModified": "2023-09-05T10:15:07.643", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38574", "id": "CVE-2023-38574",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:08.037", "published": "2023-09-05T09:15:08.037",
"lastModified": "2023-09-05T09:15:08.037", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39448", "id": "CVE-2023-39448",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:08.803", "published": "2023-09-05T09:15:08.803",
"lastModified": "2023-09-05T09:15:08.803", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39938", "id": "CVE-2023-39938",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:09.053", "published": "2023-09-05T09:15:09.053",
"lastModified": "2023-09-05T09:15:09.053", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40535", "id": "CVE-2023-40535",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:09.213", "published": "2023-09-05T09:15:09.213",
"lastModified": "2023-09-05T09:15:09.213", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40582", "id": "CVE-2023-40582",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-30T18:15:09.783", "published": "2023-08-30T18:15:09.783",
"lastModified": "2023-08-31T10:02:10.690", "lastModified": "2023-09-05T12:57:14.317",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -12,6 +12,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",
"type": "Secondary", "type": "Secondary",
@ -46,14 +66,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:find-exec_project:find-exec:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "1.0.3",
"matchCriteriaId": "9D212061-F058-4CB9-A96E-23856D97B658"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/shime/find-exec/commit/74fb108097c229b03d6dba4cce81e36aa364b51c", "url": "https://github.com/shime/find-exec/commit/74fb108097c229b03d6dba4cce81e36aa364b51c",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622", "url": "https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40705", "id": "CVE-2023-40705",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-09-05T09:15:09.340", "published": "2023-09-05T09:15:09.340",
"lastModified": "2023-09-05T09:15:09.340", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41908", "id": "CVE-2023-41908",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-09-05T07:15:14.810", "published": "2023-09-05T07:15:14.810",
"lastModified": "2023-09-05T07:15:14.810", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41909", "id": "CVE-2023-41909",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-09-05T07:15:14.877", "published": "2023-09-05T07:15:14.877",
"lastModified": "2023-09-05T07:15:14.877", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41910", "id": "CVE-2023-41910",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-09-05T07:15:14.927", "published": "2023-09-05T07:15:14.927",
"lastModified": "2023-09-05T07:15:14.927", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-4540", "id": "CVE-2023-4540",
"sourceIdentifier": "cvd@cert.pl", "sourceIdentifier": "cvd@cert.pl",
"published": "2023-09-05T08:15:40.017", "published": "2023-09-05T08:15:40.017",
"lastModified": "2023-09-05T08:15:40.017", "lastModified": "2023-09-05T12:54:46.447",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator HTTP Library for Lua allows Excessive Allocation.This issue affects HTTP Library for Lua: before commit ddab283.\n\n" "value": "Improper Handling of Exceptional Conditions vulnerability in Daurnimator lua-http library allows Excessive Allocation and a denial of service (DoS) attack to be executed by sending a properly crafted request to the server. \n\nThis issue affects lua-http: all versions before commit ddab283."
} }
], ],
"metrics": {}, "metrics": {},
@ -24,6 +24,10 @@
} }
], ],
"references": [ "references": [
{
"url": "https://cert.pl/posts/2023/09/CVE-2023-4540/",
"source": "cvd@cert.pl"
},
{ {
"url": "https://github.com/daurnimator/lua-http/commit/ddab2835c583d45dec62680ca8d3cbde55e0bae6", "url": "https://github.com/daurnimator/lua-http/commit/ddab2835c583d45dec62680ca8d3cbde55e0bae6",
"source": "cvd@cert.pl" "source": "cvd@cert.pl"

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-09-05T12:00:25.321378+00:00 2023-09-05T14:00:25.738677+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-09-05T11:43:01.273000+00:00 2023-09-05T13:33:34.903000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -29,24 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
224191 224192
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `4` Recently added CVEs: `1`
* [CVE-2023-36492](CVE-2023/CVE-2023-364xx/CVE-2023-36492.json) (`2023-09-05T10:15:07.463`) * [CVE-2022-41763](CVE-2022/CVE-2022-417xx/CVE-2022-41763.json) (`2023-09-05T13:15:07.717`)
* [CVE-2023-38569](CVE-2023/CVE-2023-385xx/CVE-2023-38569.json) (`2023-09-05T10:15:07.643`)
* [CVE-2023-20897](CVE-2023/CVE-2023-208xx/CVE-2023-20897.json) (`2023-09-05T11:15:32.973`)
* [CVE-2023-20898](CVE-2023/CVE-2023-208xx/CVE-2023-20898.json) (`2023-09-05T11:15:33.300`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `1` Recently modified CVEs: `51`
* [CVE-2022-43151](CVE-2022/CVE-2022-431xx/CVE-2022-43151.json) (`2023-09-05T11:43:01.273`) * [CVE-2023-21654](CVE-2023/CVE-2023-216xx/CVE-2023-21654.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-21655](CVE-2023/CVE-2023-216xx/CVE-2023-21655.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-21662](CVE-2023/CVE-2023-216xx/CVE-2023-21662.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-21663](CVE-2023/CVE-2023-216xx/CVE-2023-21663.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-21664](CVE-2023/CVE-2023-216xx/CVE-2023-21664.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-21667](CVE-2023/CVE-2023-216xx/CVE-2023-21667.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28538](CVE-2023/CVE-2023-285xx/CVE-2023-28538.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28543](CVE-2023/CVE-2023-285xx/CVE-2023-28543.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28544](CVE-2023/CVE-2023-285xx/CVE-2023-28544.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28548](CVE-2023/CVE-2023-285xx/CVE-2023-28548.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28549](CVE-2023/CVE-2023-285xx/CVE-2023-28549.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28557](CVE-2023/CVE-2023-285xx/CVE-2023-28557.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28558](CVE-2023/CVE-2023-285xx/CVE-2023-28558.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28559](CVE-2023/CVE-2023-285xx/CVE-2023-28559.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28560](CVE-2023/CVE-2023-285xx/CVE-2023-28560.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28562](CVE-2023/CVE-2023-285xx/CVE-2023-28562.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28564](CVE-2023/CVE-2023-285xx/CVE-2023-28564.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28565](CVE-2023/CVE-2023-285xx/CVE-2023-28565.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28567](CVE-2023/CVE-2023-285xx/CVE-2023-28567.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-28573](CVE-2023/CVE-2023-285xx/CVE-2023-28573.json) (`2023-09-05T12:54:51.627`)
* [CVE-2023-21636](CVE-2023/CVE-2023-216xx/CVE-2023-21636.json) (`2023-09-05T12:54:56.227`)
* [CVE-2023-21644](CVE-2023/CVE-2023-216xx/CVE-2023-21644.json) (`2023-09-05T12:54:56.227`)
* [CVE-2023-21646](CVE-2023/CVE-2023-216xx/CVE-2023-21646.json) (`2023-09-05T12:54:56.227`)
* [CVE-2023-21653](CVE-2023/CVE-2023-216xx/CVE-2023-21653.json) (`2023-09-05T12:54:56.227`)
* [CVE-2023-40582](CVE-2023/CVE-2023-405xx/CVE-2023-40582.json) (`2023-09-05T12:57:14.317`)
## Download and Usage ## Download and Usage