Auto-Update: 2023-08-10T18:00:35.894624+00:00

This commit is contained in:
cad-safe-bot 2023-08-10 18:00:39 +00:00
parent a77dbfdace
commit 1799168297
35 changed files with 16054 additions and 136 deletions

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-47636",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-10T16:15:09.627",
"lastModified": "2023-08-10T16:15:09.627",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A DLL hijacking vulnerability has been discovered in OutSystems Service Studio 11 11.53.30 build 61739. When a user open a .oml file (OutSystems Modeling Language), the application will load the following DLLs from the same directory av_libGLESv2.dll, libcef.DLL, user32.dll, and d3d10warp.dll. Using a crafted DLL, it is possible to execute arbitrary code in the context of the current logged in user."
}
],
"metrics": {},
"references": [
{
"url": "https://www.exploit-db.com/exploits/51678",
"source": "cve@mitre.org"
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21643",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:13.303",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T17:14:19.857",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
@ -34,10 +54,675 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin",
"source": "product-security@qualcomm.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDCB8499-A096-4633-8506-63C0A227A958"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEE2C7C3-E928-4466-B537-0D1826E2223C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD17C0A3-A200-4659-968B-B2DA03CB683F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1F31FFB-982A-4308-82F8-C2480DABDED8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11405993-5903-4716-B452-370281034B42"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C40544E-B040-491C-8DF3-50225E70B50C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2DAC85C-CDC9-4784-A69A-147A2CE8A8B2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F33EB594-B0D3-42F2-B1CA-B0E6C9D82C6B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50EF47E5-2875-412F-815D-44804BB3A739"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin",
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35356",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.413",
"lastModified": "2023-07-18T13:34:07.400",
"vulnStatus": "Analyzed",
"lastModified": "2023-08-10T17:15:09.367",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -110,6 +110,14 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174115/Microsoft-Windows-Kernel-Arbitrary-Read.html",
"source": "secure@microsoft.com"
},
{
"url": "http://packetstormsecurity.com/files/174118/Microsoft-Windows-Kernel-Security-Descriptor-Use-After-Free.html",
"source": "secure@microsoft.com"
},
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35356",
"source": "secure@microsoft.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35357",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.467",
"lastModified": "2023-07-18T13:37:13.943",
"vulnStatus": "Analyzed",
"lastModified": "2023-08-10T17:15:09.890",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -110,6 +110,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174116/Microsoft-Windows-Kernel-Unsafe-Reference.html",
"source": "secure@microsoft.com"
},
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35357",
"source": "secure@microsoft.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35358",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.520",
"lastModified": "2023-07-18T13:37:29.030",
"vulnStatus": "Analyzed",
"lastModified": "2023-08-10T17:15:10.223",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -110,6 +110,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174117/Microsoft-Windows-Kernel-Unsafe-Reference.html",
"source": "secure@microsoft.com"
},
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35358",
"source": "secure@microsoft.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3526",
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-08-08T07:15:10.150",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T16:34:03.560",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -46,10 +46,211 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-017",
"source": "info@cert.vde.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:cloud_client_1101t-tx_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.06.10",
"matchCriteriaId": "F27D7C23-5F63-42C6-AEC8-B3033693B91E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:cloud_client_1101t-tx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B6CD87A-C42B-4452-BCE8-87AAC75A07A0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:tc_cloud_client_1002-4g_att_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.07.2",
"matchCriteriaId": "B4EC6E85-D2D8-4D8B-86E5-FF50BAD5584F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:tc_cloud_client_1002-4g_att:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98C24755-6451-49AD-8DD6-2A4A20E42E06"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:tc_cloud_client_1002-4g_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.07.2",
"matchCriteriaId": "8294FF44-17CF-45B3-BCAD-D334AF4001FA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:tc_cloud_client_1002-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C42AB40F-8156-4C5C-86DC-8F10E6C70F4D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:tc_cloud_client_1002-4g_vzw_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.07.2",
"matchCriteriaId": "C3133D1F-7110-411B-B242-A5F58F2CBB47"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:tc_cloud_client_1002-4g_vzw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6480AF5-913F-4D2E-879F-149B25513093"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:tc_router_3002t-4g_att_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.07.2",
"matchCriteriaId": "18E45B91-E395-4F80-AD9E-6993C881BDEE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:tc_router_3002t-4g_att:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C2CB341-1DD5-4A74-A6D4-5AA7F01E50BD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:tc_router_3002t-4g_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.07.2",
"matchCriteriaId": "E4FD4A8A-5B20-4467-A8C5-DB8CAE10B78D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:tc_router_3002t-4g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34273B74-2964-4DDF-B464-6D312528366B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:tc_router_3002t-4g_vzw_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.07.2",
"matchCriteriaId": "88EA471C-672E-4DD0-B0C9-2E5E7C695774"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:tc_router_3002t-4g_vzw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA9B96D9-DBCD-4858-94B1-CFE5AF2DD35E"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-017",
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3571",
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-08-08T07:15:10.727",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T17:08:28.947",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "info@cert.vde.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
@ -46,10 +66,183 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-018/",
"source": "info@cert.vde.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:wp_6070-wvps_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.10",
"matchCriteriaId": "30A330AB-B871-4312-927A-BF73D745DFD1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:wp_6070-wvps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7746DBEC-655D-4405-B457-202342434B49"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:wp_6101-wxps_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.10",
"matchCriteriaId": "E4F5E047-4212-498C-8C8A-4454C53A34DD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:wp_6101-wxps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04FBD160-0582-4049-B6F2-7A56CC056FF2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:wp_6121-wxps_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.10",
"matchCriteriaId": "75E09A8E-A36E-4E5D-A62F-A8DABAB4258F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:wp_6121-wxps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "206E4626-E7B8-4744-A258-9B9941652018"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:wp_6156-whps_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.10",
"matchCriteriaId": "1859A631-9C2E-4AA6-BFA1-7DE9E779BD6E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:wp_6156-whps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DF6A8F5-E997-4B75-BB55-4C77BE3011F6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:wp_6185-whps_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.10",
"matchCriteriaId": "D2329179-AE02-4B31-A5FD-BD6E205726F7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:wp_6185-whps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C60EBBD-552C-48AB-975E-C3B7D3009CC7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:phoenixcontact:wp_6215-whps_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.10",
"matchCriteriaId": "D743C23B-054C-4F62-BCFB-BE90CF53832E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:phoenixcontact:wp_6215-whps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6CCE4E8-7EDF-44E9-8ED7-3FB88256674F"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-018/",
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36309",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-10T17:15:10.487",
"lastModified": "2023-08-10T17:15:10.487",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a Cross Site Scripting (XSS) vulnerability in the \"action\" parameter of index.php in PHPJabbers Document Creator v1.0."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/document-creator",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36310",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-10T17:15:10.773",
"lastModified": "2023-08-10T17:15:10.773",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a Cross Site Scripting (XSS) vulnerability in the \"column\" parameter of index.php in PHPJabbers Document Creator v1.0."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/document-creator",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36311",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-10T17:15:10.907",
"lastModified": "2023-08-10T17:15:10.907",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a SQL injection (SQLi) vulnerability in the \"column\" parameter of index.php in PHPJabbers Document Creator v1.0."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/document-creator",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36312",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-10T17:15:11.187",
"lastModified": "2023-08-10T17:15:11.187",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a Cross Site Scripting (XSS) vulnerability in the value-enum-o_bf_include_timezone parameter of index.php in PHPJabbers Callback Widget v1.0."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/callback-widget/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36313",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-10T17:15:11.447",
"lastModified": "2023-08-10T17:15:11.447",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Document Creator v1.0 is vulnerable to Cross Site Scripting (XSS) via all post parameters of \"Export Requests\" aside from \"request_feed\"."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/document-creator",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36314",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-10T17:15:11.587",
"lastModified": "2023-08-10T17:15:11.587",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a Cross Site Scripting (XSS) vulnerability in the value-text-o_sms_email_request_message parameters of index.php in PHPJabbers Callback Widget v1.0."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/callback-widget",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36315",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-10T17:15:11.793",
"lastModified": "2023-08-10T17:15:11.793",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a Cross Site Scripting (XSS) vulnerability in the \"action\" parameter of index.php in PHPJabbers Callback Widget v1.0."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/@milfortutz/multiple-vulnerabilities-in-phpjabbers-part-1-6703becb4cd4",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/callback-widget",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38487",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-04T16:15:10.030",
"lastModified": "2023-08-04T17:10:50.263",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T16:55:49.323",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,40 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/hedgedoc/hedgedoc/pull/4476/commits/781263ab84255885e1fe60c7e92e2f8d611664d2",
"source": "security-advisories@github.com"
},
"nodes": [
{
"url": "https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg",
"source": "security-advisories@github.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hedgedoc:hedgedoc:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.9.9",
"matchCriteriaId": "CB63D47F-48DB-43D9-898C-FA6A972FC563"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hedgedoc/hedgedoc/pull/4476/commits/781263ab84255885e1fe60c7e92e2f8d611664d2",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,303 @@
"id": "CVE-2023-38931",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-07T19:15:10.977",
"lastModified": "2023-08-07T19:30:20.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T17:17:05.110",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Tenda AC10 V1.0 V15.03.06.23, AC1206 V15.03.06.23, AC8 v4 V16.03.34.06, AC6 V2.0 V15.03.06.23, AC7 V1.0 V15.03.06.44, F1203 V2.0.1.6, AC5 V1.0 V15.03.06.28, AC10 v4.0 V16.03.10.13 and FH1203 V2.0.1.6 were discovered to contain a stack overflow via the list parameter in the setaccount function."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/cloudv2_setaccount/README.md",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac10_firmware:15.03.06.23:*:*:*:*:*:*:*",
"matchCriteriaId": "66ED84F0-B0EB-4F55-9AD6-C8B682BAB472"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac10:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF790B76-6CAD-483A-95FA-80955643825B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23:*:*:*:*:*:*:*",
"matchCriteriaId": "787A50A1-EDBC-44EB-8CF2-11C4FC63719D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29D5013D-520A-461A-95FF-43B2BE160F91"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac8_firmware:16.03.34.06:*:*:*:*:*:*:*",
"matchCriteriaId": "9C1D64DC-1EDC-4F62-8D22-E1890B71843C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac8:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "655619B2-6E8B-4D2E-98E7-028E69597E80"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.06.23:*:*:*:*:*:*:*",
"matchCriteriaId": "D82FD30C-AF3C-4E3B-B674-002A5C9ED09D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac6:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E382AD7E-1450-40FC-AE9D-698B491805F0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*",
"matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac7:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96503617-6B69-4862-ADFE-4EF379876F0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:f1203_firmware:2.0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0B3530E4-70D6-4246-84CA-E25797329DE0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:f1203:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FB77DC8-C11D-418A-AB87-5FE0226CA6CA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac5_firmware:15.03.06.28:*:*:*:*:*:*:*",
"matchCriteriaId": "7F928648-C8B2-4D37-8343-C74AABEFAB07"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D141716B-56F0-4061-9D87-943B7858F2F4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac10_firmware:16.03.10.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1C8715-D7B4-4D1A-9E90-079C72049332"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac10:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "970AEBF4-2B32-4633-A75B-2D2C598C048D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh1203_firmware:2.0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E28AF51D-EBFB-4EC8-9FCB-C3DFAE1DBB2E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:fh1203:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7A0DCB-AC18-4F32-86E2-F2C2E9118A71"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/cloudv2_setaccount/README.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,303 @@
"id": "CVE-2023-38933",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-07T19:15:11.133",
"lastModified": "2023-08-07T19:30:20.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T17:17:41.653",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Tenda AC6 V2.0 V15.03.06.23, AC7 V1.0 V15.03.06.44, F1203 V2.0.1.6, AC5 V1.0 V15.03.06.28, FH1203 V2.0.1.6 and AC9 V3.0 V15.03.06.42_multi, and FH1205 V2.0.0.7(775) were discovered to contain a stack overflow via the deviceId parameter in the formSetClientState function."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/formSetClientState/README.md",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac10_firmware:15.03.06.23:*:*:*:*:*:*:*",
"matchCriteriaId": "66ED84F0-B0EB-4F55-9AD6-C8B682BAB472"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac10:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF790B76-6CAD-483A-95FA-80955643825B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23:*:*:*:*:*:*:*",
"matchCriteriaId": "787A50A1-EDBC-44EB-8CF2-11C4FC63719D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29D5013D-520A-461A-95FF-43B2BE160F91"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.06.23:*:*:*:*:*:*:*",
"matchCriteriaId": "D82FD30C-AF3C-4E3B-B674-002A5C9ED09D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac6:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E382AD7E-1450-40FC-AE9D-698B491805F0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*",
"matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac7:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96503617-6B69-4862-ADFE-4EF379876F0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:f1203_firmware:2.0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0B3530E4-70D6-4246-84CA-E25797329DE0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:f1203:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FB77DC8-C11D-418A-AB87-5FE0226CA6CA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac5_firmware:15.03.06.28:*:*:*:*:*:*:*",
"matchCriteriaId": "7F928648-C8B2-4D37-8343-C74AABEFAB07"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D141716B-56F0-4061-9D87-943B7858F2F4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh1203_firmware:2.0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E28AF51D-EBFB-4EC8-9FCB-C3DFAE1DBB2E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:fh1203:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E7A0DCB-AC18-4F32-86E2-F2C2E9118A71"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh1205_firmware:2.0.0.7\\(775\\):*:*:*:*:*:*:*",
"matchCriteriaId": "706158B7-6114-4AA8-A1A0-BB24119A3264"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:fh1205:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E92D910-72BB-443F-9927-1E72AC8C8C9B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac9_firmware:15.03.06.42_multi:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE11228-D2BB-48CF-BFDA-E2AA73E73C3C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac9:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F482F89-B0F6-450D-B675-43EC0A9E6A4B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/formSetClientState/README.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,195 @@
"id": "CVE-2023-38935",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-07T19:15:11.277",
"lastModified": "2023-08-07T19:30:20.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T17:18:24.527",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Tenda AC1206 V15.03.06.23, AC8 V4 V16.03.34.06, AC5 V1.0 V15.03.06.28, AC10 v4.0 V16.03.10.13 and AC9 V3.0 V15.03.06.42_multi were discovered to contain a tack overflow via the list parameter in the formSetQosBand function."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/formSetQosBand/README.md",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23:*:*:*:*:*:*:*",
"matchCriteriaId": "787A50A1-EDBC-44EB-8CF2-11C4FC63719D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29D5013D-520A-461A-95FF-43B2BE160F91"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac5_firmware:15.03.06.28:*:*:*:*:*:*:*",
"matchCriteriaId": "7F928648-C8B2-4D37-8343-C74AABEFAB07"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D141716B-56F0-4061-9D87-943B7858F2F4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac9_firmware:15.03.06.42_multi:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE11228-D2BB-48CF-BFDA-E2AA73E73C3C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac9:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F482F89-B0F6-450D-B675-43EC0A9E6A4B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac8_firmware:16.03.34.06:*:*:*:*:*:*:*",
"matchCriteriaId": "9C1D64DC-1EDC-4F62-8D22-E1890B71843C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac8:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "655619B2-6E8B-4D2E-98E7-028E69597E80"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac10_firmware:16.03.10.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1C8715-D7B4-4D1A-9E90-079C72049332"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac10:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "970AEBF4-2B32-4633-A75B-2D2C598C048D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/formSetQosBand/README.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3898",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-08-08T09:15:10.880",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T17:50:03.287",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -46,10 +46,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0440",
"source": "cve@usom.gov.tr"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayanets:e-commerce:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1",
"matchCriteriaId": "4BD50B39-8719-4C2E-BC7E-D7B208C76A57"
}
]
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0440",
"source": "cve@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39182",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:17.223",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T16:02:54.477",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -46,10 +76,66 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf",
"source": "productcert@siemens.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
"versionEndExcluding": "se2023",
"matchCriteriaId": "F20768FD-EB6F-40EA-BDEA-17C9BA60A1E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:-:*:*:*:*:*:*",
"matchCriteriaId": "A8332862-1FB4-4824-9665-5A50184EB366"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack1:*:*:*:*:*:*",
"matchCriteriaId": "31441523-2923-4028-83E9-AAB998120A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack2:*:*:*:*:*:*",
"matchCriteriaId": "7986AB87-876E-4E47-AEEB-9936491AA535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack3:*:*:*:*:*:*",
"matchCriteriaId": "734D353F-4DBF-4001-8BC2-0760BE40BE55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack4:*:*:*:*:*:*",
"matchCriteriaId": "63FCD2EA-EFCF-4959-B5C2-801E870B37AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack5:*:*:*:*:*:*",
"matchCriteriaId": "22949AFB-EF6F-4DF9-953B-5372686574B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack6:*:*:*:*:*:*",
"matchCriteriaId": "8437DCAC-5CEC-4C52-80DE-91F785CB3F8E"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf",
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39183",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:17.320",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T16:04:10.890",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -46,10 +76,66 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf",
"source": "productcert@siemens.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
"versionEndExcluding": "se2023",
"matchCriteriaId": "F20768FD-EB6F-40EA-BDEA-17C9BA60A1E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:-:*:*:*:*:*:*",
"matchCriteriaId": "A8332862-1FB4-4824-9665-5A50184EB366"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack1:*:*:*:*:*:*",
"matchCriteriaId": "31441523-2923-4028-83E9-AAB998120A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack2:*:*:*:*:*:*",
"matchCriteriaId": "7986AB87-876E-4E47-AEEB-9936491AA535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack3:*:*:*:*:*:*",
"matchCriteriaId": "734D353F-4DBF-4001-8BC2-0760BE40BE55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack4:*:*:*:*:*:*",
"matchCriteriaId": "63FCD2EA-EFCF-4959-B5C2-801E870B37AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack5:*:*:*:*:*:*",
"matchCriteriaId": "22949AFB-EF6F-4DF9-953B-5372686574B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack6:*:*:*:*:*:*",
"matchCriteriaId": "8437DCAC-5CEC-4C52-80DE-91F785CB3F8E"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf",
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39184",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:17.423",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T16:04:22.087",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -46,10 +76,66 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf",
"source": "productcert@siemens.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
"versionEndExcluding": "se2023",
"matchCriteriaId": "F20768FD-EB6F-40EA-BDEA-17C9BA60A1E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:-:*:*:*:*:*:*",
"matchCriteriaId": "A8332862-1FB4-4824-9665-5A50184EB366"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack1:*:*:*:*:*:*",
"matchCriteriaId": "31441523-2923-4028-83E9-AAB998120A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack2:*:*:*:*:*:*",
"matchCriteriaId": "7986AB87-876E-4E47-AEEB-9936491AA535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack3:*:*:*:*:*:*",
"matchCriteriaId": "734D353F-4DBF-4001-8BC2-0760BE40BE55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack4:*:*:*:*:*:*",
"matchCriteriaId": "63FCD2EA-EFCF-4959-B5C2-801E870B37AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack5:*:*:*:*:*:*",
"matchCriteriaId": "22949AFB-EF6F-4DF9-953B-5372686574B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge:se2023:maintenance_pack6:*:*:*:*:*:*",
"matchCriteriaId": "8437DCAC-5CEC-4C52-80DE-91F785CB3F8E"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf",
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39349",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-07T19:15:11.697",
"lastModified": "2023-08-07T19:30:20.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T17:04:48.403",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -50,26 +70,62 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/getsentry/self-hosted/releases/tag/23.7.2",
"source": "security-advisories@github.com"
},
"nodes": [
{
"url": "https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083",
"source": "security-advisories@github.com"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://github.com/getsentry/sentry/pull/53850",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getsentry/sentry/releases/tag/23.7.2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c",
"source": "security-advisories@github.com"
"vulnerable": true,
"criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.1.0",
"versionEndExcluding": "23.7.2",
"matchCriteriaId": "C9764018-F8B3-4978-83C0-D5362EED433D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/getsentry/self-hosted/releases/tag/23.7.2",
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/getsentry/sentry/pull/53850",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/getsentry/sentry/releases/tag/23.7.2",
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39524",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-07T20:15:10.107",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T16:58:44.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/PrestaShop/PrestaShop/commit/2047d4c053043102bc46a37d383b392704bf14d7",
"source": "security-advisories@github.com"
},
"nodes": [
{
"url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-75p5-jwx4-qw9h",
"source": "security-advisories@github.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.1.1",
"matchCriteriaId": "705A3EBE-48E5-4E3B-A8D8-471098F8B56E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/PrestaShop/PrestaShop/commit/2047d4c053043102bc46a37d383b392704bf14d7",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-75p5-jwx4-qw9h",
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39525",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-07T21:15:10.230",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T17:01:40.127",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/PrestaShop/PrestaShop/commit/c7c9a5110421bb2856f4d312ecce192d079b5ec7",
"source": "security-advisories@github.com"
},
"nodes": [
{
"url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-m9r4-3fg7-pqm2",
"source": "security-advisories@github.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.1.1",
"matchCriteriaId": "705A3EBE-48E5-4E3B-A8D8-471098F8B56E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/PrestaShop/PrestaShop/commit/c7c9a5110421bb2856f4d312ecce192d079b5ec7",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-m9r4-3fg7-pqm2",
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-39957",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-10T16:15:09.797",
"lastModified": "2023-08-10T16:15:09.797",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Talk Android allows users to place video and audio calls through Nextcloud on Android. Prior to version 17.0.0, an unprotected intend allowed malicious third party apps to trick the Talk Android app into writing files outside of its intended cache directory. Nextcloud Talk Android version 17.0.0 has a patch for this issue. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 0.6,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36f7-93f3-mcfj",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/talk-android/pull/3064",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/1997029",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,27 +2,89 @@
"id": "CVE-2023-39976",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T06:15:46.590",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T16:09:40.993",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "log_blackbox.c in libqb before 2.0.8 allows a buffer overflow via long log messages because the header size is not considered."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://github.com/ClusterLabs/libqb/commit/1bbaa929b77113532785c408dd1b41cd0521ffc8",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
{
"url": "https://github.com/ClusterLabs/libqb/compare/v2.0.7...v2.0.8",
"source": "cve@mitre.org"
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://github.com/ClusterLabs/libqb/pull/490",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clusterlabs:libqb:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.8",
"matchCriteriaId": "6356D585-67AB-4E61-9DCB-50DD9662CED3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ClusterLabs/libqb/commit/1bbaa929b77113532785c408dd1b41cd0521ffc8",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/ClusterLabs/libqb/compare/v2.0.7...v2.0.8",
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://github.com/ClusterLabs/libqb/pull/490",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40216",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-10T16:15:09.907",
"lastModified": "2023-08-10T16:15:09.907",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "OpenBSD 7.3 before errata 014 is missing an argument-count bounds check in console terminal emulation. This could cause incorrect memory access and a kernel crash after receiving crafted DCS or CSI terminal escape sequences."
}
],
"metrics": {},
"references": [
{
"url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/014_wscons.patch.sig",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/openbsd/src/commit/9d3f688f46eba347e96ff0ae9506ef2061622e0c",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2023-4128",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-10T17:15:12.033",
"lastModified": "2023-08-10T17:15:12.033",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4128",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225511",
"source": "secalert@redhat.com"
},
{
"url": "https://lore.kernel.org/netdev/193d6cdf-d6c9-f9be-c36a-b2a7551d5fb6@mojatatu.com/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4195",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-08-06T18:15:10.440",
"lastModified": "2023-08-07T12:57:26.370",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-10T16:03:49.010",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -46,14 +68,41 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/cockpit-hq/cockpit/commit/800c05f1984db291769ffa5fdfb1d3e50968e95b",
"source": "security@huntr.dev"
},
"nodes": [
{
"url": "https://huntr.dev/bounties/0bd5da2f-0e29-47ce-90f3-06518656bfd6",
"source": "security@huntr.dev"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.6.3",
"matchCriteriaId": "01BAF7D9-ECB6-4E46-B1A5-DD318BBE9C8D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/cockpit-hq/cockpit/commit/800c05f1984db291769ffa5fdfb1d3e50968e95b",
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.dev/bounties/0bd5da2f-0e29-47ce-90f3-06518656bfd6",
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-10T16:00:32.884789+00:00
2023-08-10T18:00:35.894624+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-10T15:56:38.890000+00:00
2023-08-10T17:50:03.287000+00:00
```
### Last Data Feed Release
@ -29,69 +29,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
222306
222317
```
### CVEs added in the last Commit
Recently added CVEs: `41`
Recently added CVEs: `11`
* [CVE-2023-38248](CVE-2023/CVE-2023-382xx/CVE-2023-38248.json) (`2023-08-10T14:15:15.077`)
* [CVE-2023-38397](CVE-2023/CVE-2023-383xx/CVE-2023-38397.json) (`2023-08-10T14:15:15.180`)
* [CVE-2023-39952](CVE-2023/CVE-2023-399xx/CVE-2023-39952.json) (`2023-08-10T14:15:15.270`)
* [CVE-2023-39953](CVE-2023/CVE-2023-399xx/CVE-2023-39953.json) (`2023-08-10T14:15:15.370`)
* [CVE-2023-29299](CVE-2023/CVE-2023-292xx/CVE-2023-29299.json) (`2023-08-10T14:15:11.530`)
* [CVE-2023-29303](CVE-2023/CVE-2023-293xx/CVE-2023-29303.json) (`2023-08-10T14:15:11.773`)
* [CVE-2023-29320](CVE-2023/CVE-2023-293xx/CVE-2023-29320.json) (`2023-08-10T14:15:11.887`)
* [CVE-2023-37388](CVE-2023/CVE-2023-373xx/CVE-2023-37388.json) (`2023-08-10T14:15:12.007`)
* [CVE-2023-37734](CVE-2023/CVE-2023-377xx/CVE-2023-37734.json) (`2023-08-10T14:15:12.107`)
* [CVE-2023-38210](CVE-2023/CVE-2023-382xx/CVE-2023-38210.json) (`2023-08-10T14:15:12.170`)
* [CVE-2023-38222](CVE-2023/CVE-2023-382xx/CVE-2023-38222.json) (`2023-08-10T14:15:12.283`)
* [CVE-2023-38223](CVE-2023/CVE-2023-382xx/CVE-2023-38223.json) (`2023-08-10T14:15:12.397`)
* [CVE-2023-38224](CVE-2023/CVE-2023-382xx/CVE-2023-38224.json) (`2023-08-10T14:15:12.507`)
* [CVE-2023-38225](CVE-2023/CVE-2023-382xx/CVE-2023-38225.json) (`2023-08-10T14:15:12.623`)
* [CVE-2023-38226](CVE-2023/CVE-2023-382xx/CVE-2023-38226.json) (`2023-08-10T14:15:12.727`)
* [CVE-2023-38227](CVE-2023/CVE-2023-382xx/CVE-2023-38227.json) (`2023-08-10T14:15:12.847`)
* [CVE-2023-38228](CVE-2023/CVE-2023-382xx/CVE-2023-38228.json) (`2023-08-10T14:15:12.940`)
* [CVE-2023-38229](CVE-2023/CVE-2023-382xx/CVE-2023-38229.json) (`2023-08-10T14:15:13.047`)
* [CVE-2023-38230](CVE-2023/CVE-2023-382xx/CVE-2023-38230.json) (`2023-08-10T14:15:13.157`)
* [CVE-2023-38231](CVE-2023/CVE-2023-382xx/CVE-2023-38231.json) (`2023-08-10T14:15:13.253`)
* [CVE-2023-37543](CVE-2023/CVE-2023-375xx/CVE-2023-37543.json) (`2023-08-10T15:15:09.397`)
* [CVE-2023-38830](CVE-2023/CVE-2023-388xx/CVE-2023-38830.json) (`2023-08-10T15:15:09.567`)
* [CVE-2023-39776](CVE-2023/CVE-2023-397xx/CVE-2023-39776.json) (`2023-08-10T15:15:09.630`)
* [CVE-2023-39954](CVE-2023/CVE-2023-399xx/CVE-2023-39954.json) (`2023-08-10T15:15:09.693`)
* [CVE-2023-39955](CVE-2023/CVE-2023-399xx/CVE-2023-39955.json) (`2023-08-10T15:15:09.807`)
* [CVE-2022-47636](CVE-2022/CVE-2022-476xx/CVE-2022-47636.json) (`2023-08-10T16:15:09.627`)
* [CVE-2023-39957](CVE-2023/CVE-2023-399xx/CVE-2023-39957.json) (`2023-08-10T16:15:09.797`)
* [CVE-2023-40216](CVE-2023/CVE-2023-402xx/CVE-2023-40216.json) (`2023-08-10T16:15:09.907`)
* [CVE-2023-36309](CVE-2023/CVE-2023-363xx/CVE-2023-36309.json) (`2023-08-10T17:15:10.487`)
* [CVE-2023-36310](CVE-2023/CVE-2023-363xx/CVE-2023-36310.json) (`2023-08-10T17:15:10.773`)
* [CVE-2023-36311](CVE-2023/CVE-2023-363xx/CVE-2023-36311.json) (`2023-08-10T17:15:10.907`)
* [CVE-2023-36312](CVE-2023/CVE-2023-363xx/CVE-2023-36312.json) (`2023-08-10T17:15:11.187`)
* [CVE-2023-36313](CVE-2023/CVE-2023-363xx/CVE-2023-36313.json) (`2023-08-10T17:15:11.447`)
* [CVE-2023-36314](CVE-2023/CVE-2023-363xx/CVE-2023-36314.json) (`2023-08-10T17:15:11.587`)
* [CVE-2023-36315](CVE-2023/CVE-2023-363xx/CVE-2023-36315.json) (`2023-08-10T17:15:11.793`)
* [CVE-2023-4128](CVE-2023/CVE-2023-41xx/CVE-2023-4128.json) (`2023-08-10T17:15:12.033`)
### CVEs modified in the last Commit
Recently modified CVEs: `42`
Recently modified CVEs: `23`
* [CVE-2023-3373](CVE-2023/CVE-2023-33xx/CVE-2023-3373.json) (`2023-08-10T14:59:52.507`)
* [CVE-2023-0525](CVE-2023/CVE-2023-05xx/CVE-2023-0525.json) (`2023-08-10T14:59:59.350`)
* [CVE-2023-3569](CVE-2023/CVE-2023-35xx/CVE-2023-3569.json) (`2023-08-10T15:01:45.293`)
* [CVE-2023-3570](CVE-2023/CVE-2023-35xx/CVE-2023-3570.json) (`2023-08-10T15:03:15.087`)
* [CVE-2023-4196](CVE-2023/CVE-2023-41xx/CVE-2023-4196.json) (`2023-08-10T15:04:50.510`)
* [CVE-2023-20216](CVE-2023/CVE-2023-202xx/CVE-2023-20216.json) (`2023-08-10T15:09:56.450`)
* [CVE-2023-39107](CVE-2023/CVE-2023-391xx/CVE-2023-39107.json) (`2023-08-10T15:20:58.390`)
* [CVE-2023-38699](CVE-2023/CVE-2023-386xx/CVE-2023-38699.json) (`2023-08-10T15:25:49.587`)
* [CVE-2023-39188](CVE-2023/CVE-2023-391xx/CVE-2023-39188.json) (`2023-08-10T15:29:47.423`)
* [CVE-2023-38698](CVE-2023/CVE-2023-386xx/CVE-2023-38698.json) (`2023-08-10T15:33:22.140`)
* [CVE-2023-38697](CVE-2023/CVE-2023-386xx/CVE-2023-38697.json) (`2023-08-10T15:34:39.310`)
* [CVE-2023-33379](CVE-2023/CVE-2023-333xx/CVE-2023-33379.json) (`2023-08-10T15:34:55.840`)
* [CVE-2023-22666](CVE-2023/CVE-2023-226xx/CVE-2023-22666.json) (`2023-08-10T15:41:50.133`)
* [CVE-2023-21652](CVE-2023/CVE-2023-216xx/CVE-2023-21652.json) (`2023-08-10T15:47:48.503`)
* [CVE-2023-21651](CVE-2023/CVE-2023-216xx/CVE-2023-21651.json) (`2023-08-10T15:48:01.903`)
* [CVE-2023-21650](CVE-2023/CVE-2023-216xx/CVE-2023-21650.json) (`2023-08-10T15:48:22.757`)
* [CVE-2023-39185](CVE-2023/CVE-2023-391xx/CVE-2023-39185.json) (`2023-08-10T15:48:29.567`)
* [CVE-2023-21649](CVE-2023/CVE-2023-216xx/CVE-2023-21649.json) (`2023-08-10T15:48:30.060`)
* [CVE-2023-39186](CVE-2023/CVE-2023-391xx/CVE-2023-39186.json) (`2023-08-10T15:48:42.793`)
* [CVE-2023-21648](CVE-2023/CVE-2023-216xx/CVE-2023-21648.json) (`2023-08-10T15:48:58.277`)
* [CVE-2023-21647](CVE-2023/CVE-2023-216xx/CVE-2023-21647.json) (`2023-08-10T15:49:12.090`)
* [CVE-2023-39187](CVE-2023/CVE-2023-391xx/CVE-2023-39187.json) (`2023-08-10T15:49:15.690`)
* [CVE-2023-37581](CVE-2023/CVE-2023-375xx/CVE-2023-37581.json) (`2023-08-10T15:53:37.093`)
* [CVE-2023-32600](CVE-2023/CVE-2023-326xx/CVE-2023-32600.json) (`2023-08-10T15:56:31.620`)
* [CVE-2023-39181](CVE-2023/CVE-2023-391xx/CVE-2023-39181.json) (`2023-08-10T15:56:38.890`)
* [CVE-2022-40510](CVE-2022/CVE-2022-405xx/CVE-2022-40510.json) (`2023-08-10T17:26:55.177`)
* [CVE-2023-39182](CVE-2023/CVE-2023-391xx/CVE-2023-39182.json) (`2023-08-10T16:02:54.477`)
* [CVE-2023-4195](CVE-2023/CVE-2023-41xx/CVE-2023-4195.json) (`2023-08-10T16:03:49.010`)
* [CVE-2023-39183](CVE-2023/CVE-2023-391xx/CVE-2023-39183.json) (`2023-08-10T16:04:10.890`)
* [CVE-2023-39184](CVE-2023/CVE-2023-391xx/CVE-2023-39184.json) (`2023-08-10T16:04:22.087`)
* [CVE-2023-39976](CVE-2023/CVE-2023-399xx/CVE-2023-39976.json) (`2023-08-10T16:09:40.993`)
* [CVE-2023-3526](CVE-2023/CVE-2023-35xx/CVE-2023-3526.json) (`2023-08-10T16:34:03.560`)
* [CVE-2023-38487](CVE-2023/CVE-2023-384xx/CVE-2023-38487.json) (`2023-08-10T16:55:49.323`)
* [CVE-2023-39524](CVE-2023/CVE-2023-395xx/CVE-2023-39524.json) (`2023-08-10T16:58:44.633`)
* [CVE-2023-39525](CVE-2023/CVE-2023-395xx/CVE-2023-39525.json) (`2023-08-10T17:01:40.127`)
* [CVE-2023-39349](CVE-2023/CVE-2023-393xx/CVE-2023-39349.json) (`2023-08-10T17:04:48.403`)
* [CVE-2023-3571](CVE-2023/CVE-2023-35xx/CVE-2023-3571.json) (`2023-08-10T17:08:28.947`)
* [CVE-2023-21643](CVE-2023/CVE-2023-216xx/CVE-2023-21643.json) (`2023-08-10T17:14:19.857`)
* [CVE-2023-35356](CVE-2023/CVE-2023-353xx/CVE-2023-35356.json) (`2023-08-10T17:15:09.367`)
* [CVE-2023-35357](CVE-2023/CVE-2023-353xx/CVE-2023-35357.json) (`2023-08-10T17:15:09.890`)
* [CVE-2023-35358](CVE-2023/CVE-2023-353xx/CVE-2023-35358.json) (`2023-08-10T17:15:10.223`)
* [CVE-2023-38931](CVE-2023/CVE-2023-389xx/CVE-2023-38931.json) (`2023-08-10T17:17:05.110`)
* [CVE-2023-38933](CVE-2023/CVE-2023-389xx/CVE-2023-38933.json) (`2023-08-10T17:17:41.653`)
* [CVE-2023-38935](CVE-2023/CVE-2023-389xx/CVE-2023-38935.json) (`2023-08-10T17:18:24.527`)
* [CVE-2023-21627](CVE-2023/CVE-2023-216xx/CVE-2023-21627.json) (`2023-08-10T17:20:44.040`)
* [CVE-2023-21626](CVE-2023/CVE-2023-216xx/CVE-2023-21626.json) (`2023-08-10T17:23:26.837`)
* [CVE-2023-21625](CVE-2023/CVE-2023-216xx/CVE-2023-21625.json) (`2023-08-10T17:24:21.607`)
* [CVE-2023-3898](CVE-2023/CVE-2023-38xx/CVE-2023-3898.json) (`2023-08-10T17:50:03.287`)
## Download and Usage