Auto-Update: 2023-09-07T18:00:26.095907+00:00

This commit is contained in:
cad-safe-bot 2023-09-07 18:00:29 +00:00
parent b0cd68cfa9
commit 22c059c01b
48 changed files with 5697 additions and 192 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-2808",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-04-01T02:00:35.097",
"lastModified": "2020-11-23T19:47:50.097",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-07T17:15:37.500",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -55,7 +55,6 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -118,7 +117,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -139,7 +137,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -280,7 +277,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -388,7 +384,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -1644,7 +1639,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -1695,7 +1689,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -2482,6 +2475,10 @@
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44189",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:07.843",
"lastModified": "2023-09-07T14:15:07.843",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:48.697",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44190",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:08.187",
"lastModified": "2023-09-07T14:15:08.187",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44191",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:08.383",
"lastModified": "2023-09-07T14:15:08.383",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44192",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:08.573",
"lastModified": "2023-09-07T14:15:08.573",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44193",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:08.750",
"lastModified": "2023-09-07T14:15:08.750",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44194",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:08.943",
"lastModified": "2023-09-07T14:15:08.943",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44195",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:09.147",
"lastModified": "2023-09-07T14:15:09.147",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30637",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:09.323",
"lastModified": "2023-09-07T14:15:09.323",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30638",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:09.487",
"lastModified": "2023-09-07T14:15:09.487",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30639",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:09.690",
"lastModified": "2023-09-07T14:15:09.690",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30640",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:09.930",
"lastModified": "2023-09-07T14:15:09.930",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30641",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:10.057",
"lastModified": "2023-09-07T14:15:10.057",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30642",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:10.253",
"lastModified": "2023-09-07T14:15:10.253",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30643",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:10.430",
"lastModified": "2023-09-07T14:15:10.430",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30644",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:10.707",
"lastModified": "2023-09-07T14:15:10.707",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30645",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:10.910",
"lastModified": "2023-09-07T14:15:10.910",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30646",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-09-07T14:15:11.183",
"lastModified": "2023-09-07T14:15:11.183",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4343",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-01T11:15:40.037",
"lastModified": "2023-09-01T11:47:43.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:31:05.553",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -46,14 +76,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "13.12",
"versionEndExcluding": "16.1.5",
"matchCriteriaId": "2E1E64DE-3BE7-4319-B93C-EB549C036847"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "16.2.5",
"matchCriteriaId": "4E03E8BA-63C8-47D5-B5A1-26DF199E1F65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "08D6B555-39B6-493D-8460-3DC998BAF651"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/385124",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://hackerone.com/reports/1767797",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,23 +2,94 @@
"id": "CVE-2022-46527",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-01T11:15:39.693",
"lastModified": "2023-09-01T11:47:43.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:32:32.523",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ELSYS ERS 1.5 Sound v2.3.8 was discovered to contain a buffer overflow via the NFC data parser."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:elsys:ers_1.5_firmware:2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E366C429-25AD-4DDB-A33D-3E80CEADC115"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:elsys:ers_1.5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55D87C65-24E6-4538-BCC1-82E4795453AA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2022-46527.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.elsys.se/en/ers-sound/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0120",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-01T11:15:40.287",
"lastModified": "2023-09-01T11:47:43.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:27:27.283",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -46,14 +76,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "16.1.5",
"matchCriteriaId": "3A887955-FFCC-41E7-9EB0-C7C2E99955F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "16.1.5",
"matchCriteriaId": "EDDBF1C4-0446-4795-8BBC-4CD0049126D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "16.2.5",
"matchCriteriaId": "18116007-7452-495F-80A1-39499882656E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "16.2.5",
"matchCriteriaId": "4E03E8BA-63C8-47D5-B5A1-26DF199E1F65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:community:*:*:*",
"matchCriteriaId": "EE9B8DE8-9990-494B-BDBE-F867DDBB9D57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "08D6B555-39B6-493D-8460-3DC998BAF651"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/387531",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://hackerone.com/reports/1818425",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1279",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-01T11:15:40.473",
"lastModified": "2023-09-01T11:47:43.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:15:09.363",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -46,14 +76,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"versionStartIncluding": "4.1.0",
"versionEndExcluding": "16.1.5",
"matchCriteriaId": "EC779153-17C6-446D-ABEA-6CC063291EB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "4.1.0",
"versionEndExcluding": "16.1.5",
"matchCriteriaId": "20DAB667-C975-4AA3-BDC0-87DFCE838B76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "16.2.5",
"matchCriteriaId": "18116007-7452-495F-80A1-39499882656E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "16.2.5",
"matchCriteriaId": "4E03E8BA-63C8-47D5-B5A1-26DF199E1F65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:community:*:*:*",
"matchCriteriaId": "EE9B8DE8-9990-494B-BDBE-F867DDBB9D57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "08D6B555-39B6-493D-8460-3DC998BAF651"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/395437",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://hackerone.com/reports/1889230",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1555",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-01T11:15:40.663",
"lastModified": "2023-09-01T11:47:43.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:11:04.963",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -46,14 +76,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"versionStartIncluding": "15.2.0",
"versionEndExcluding": "16.1.5",
"matchCriteriaId": "0BB62198-2175-4319-9754-A55F5AA20EDD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "15.2.0",
"versionEndExcluding": "16.1.5",
"matchCriteriaId": "8EBBBC86-4F64-4EAB-AF11-5552ED8FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "16.2.5",
"matchCriteriaId": "18116007-7452-495F-80A1-39499882656E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "16.2.5",
"matchCriteriaId": "4E03E8BA-63C8-47D5-B5A1-26DF199E1F65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:community:*:*:*",
"matchCriteriaId": "EE9B8DE8-9990-494B-BDBE-F867DDBB9D57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "08D6B555-39B6-493D-8460-3DC998BAF651"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/398587",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://hackerone.com/reports/1911908",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20200",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-08-23T19:15:08.020",
"lastModified": "2023-08-24T02:02:17.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:58:03.400",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.0
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -34,10 +54,270 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:firepower_9300_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "758D00BF-FE5B-4B90-8337-63E7832ABBF7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07DAFDDA-718B-4B69-A524-B0CEB80FE960"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:firepower_4143_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D39A19D-19BB-4764-BE57-DAEEFE6596BB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81F4868A-6D62-479C-9C19-F9AABDBB6B24"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:firepower_4112_firwmare:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D61D8497-03BA-4F00-AF74-C694472E1FCB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*",
"matchCriteriaId": "957D64EB-D60E-4775-B9A8-B21CA48ED3B1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ucs_6324_fabric_interconnect_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1",
"versionEndExcluding": "4.1\\(3l\\)",
"matchCriteriaId": "BE4ED9CB-E836-4D6F-B122-ECC18705E067"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ucs_6324_fabric_interconnect_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.2\\(3d\\)",
"matchCriteriaId": "07109492-B992-487D-92C2-CE6DD1A2FF86"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ucs_6324_fabric_interconnect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "104AB7AA-2AB6-40AB-9BCA-2041396060B1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:firepower_4125_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7F8C83C-935A-46A6-882F-0622E92568AC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71DCEF22-ED20-4330-8502-EC2DD4C9838F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:firepower_4115:-:*:*:*:*:*:*:*",
"matchCriteriaId": "929DDD2E-9B37-4F02-B918-9ED630924CEE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A694AD51-9008-4AE6-8240-98B17AB527EE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ucs_6332_fabric_interconnect_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1",
"versionEndExcluding": "4.1\\(3l\\)",
"matchCriteriaId": "F240568E-94D6-4D8A-A816-485716EFC28F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ucs_6332_fabric_interconnect_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndIncluding": "4.2\\(3b\\)",
"matchCriteriaId": "1C159CA3-EFA3-4DC0-9333-5A84FB18433E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ucs_6332_fabric_interconnect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB5291D-D248-4125-9129-BC655F082AD8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ucs_6332-16up_fabric_interconnect_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1",
"versionEndExcluding": "4.1\\(3l\\)",
"matchCriteriaId": "283CEA69-32D4-4498-83E3-A4A0FA650787"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ucs_6332-16up_fabric_interconnect_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.2\\(3b\\)",
"matchCriteriaId": "1771B4C5-F49C-4D1B-8706-A0EEE5EE0511"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:ucs_6332-16up_fabric_interconnect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEAF3163-4FF6-4BB0-8870-80D3F3F2953B"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp-ucsfi-snmp-dos-qtv69NAO",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,23 +2,83 @@
"id": "CVE-2023-24674",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-01T10:15:07.950",
"lastModified": "2023-09-01T11:47:50.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:58:01.300",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Permissions vulnerability found in Bludit CMS v.4.0.0 allows local attackers to escalate privileges via the role:admin parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bludit:bludit:4.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "E8EDF60E-870B-4656-9068-5BBBF37BEE58"
}
]
}
]
}
],
"references": [
{
"url": "https://cupc4k3.medium.com/cve-2023-24674-uncovering-a-privilege-escalation-vulnerability-in-bludit-cms-dcf86c41107",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://medium.com/@cupc4k3/privilege-scalation-in-bludit-cms-dcf86c41107",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25477",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-09-01T11:15:41.503",
"lastModified": "2023-09-01T11:47:43.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T16:34:40.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yotuwp:video_gallery:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.13",
"matchCriteriaId": "DE3B739D-CD9E-48B6-A3CE-3A874435DDAB"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/yotuwp-easy-youtube-embed/wordpress-video-gallery-youtube-playlist-channel-gallery-by-yotuwp-plugin-1-3-12-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25488",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-09-01T11:15:41.677",
"lastModified": "2023-09-01T11:47:43.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T16:34:31.380",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ducbuiquang:wp_default_feature_image:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.1.1",
"matchCriteriaId": "56F45950-3641-4FB5-BE83-C8D016ADF0A1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-default-feature-image/wordpress-wp-default-feature-image-plugin-1-0-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-30800",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2023-09-07T16:15:07.670",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The web server used by MikroTik RouterOS version 6 is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the server's heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted. The issue was fixed in RouterOS 6.49.10 stable. RouterOS version 7 is not affected.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/mikrotik-jsproxy-dos",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -2,19 +2,479 @@
"id": "CVE-2023-36187",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-01T16:15:08.020",
"lastModified": "2023-09-01T21:15:30.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:05:35.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in NETGEAR R6400v2 before version 1.0.4.118, allows remote unauthenticated attackers to execute arbitrary code via crafted URL to httpd."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.5.0.24",
"matchCriteriaId": "7483E92A-5858-49B5-9499-E132941F5ACD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE0F7E9E-196C-4106-B1C9-C16FA5910A0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:lax20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.6.34",
"matchCriteriaId": "BF0F2B55-DBD3-4762-92EA-A01D57277A9D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:lax20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "491CEB8D-22F3-4F86-96F0-03C5C58BA295"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.6.122",
"matchCriteriaId": "0A6768BE-C869-4CC5-B683-08B8E4DDD683"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69A79475-37BE-47BD-A629-DCEF22500B0B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.6.122",
"matchCriteriaId": "4F6E7187-B191-473D-9E9D-0990447AB8C6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65BB3ECD-2F0B-4625-A1DB-F6CEFC46E277"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.6.122",
"matchCriteriaId": "476B2ED6-D7C9-4B84-BCD0-9C98B80A5F53"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F003F064-591C-4D7C-9EC4-D0E553BC6683"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rbw30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.6.2.6",
"matchCriteriaId": "40DCD126-3E67-4D6E-BD6D-BB84E4FDB344"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rbw30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA73D22-970D-45F2-81F3-9576C04CCC94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.1.70",
"matchCriteriaId": "CA1BB56F-20B5-4A79-AE9D-429A011EAA4C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E4CDF6B-3829-44D0-9675-71D7BE83CAA2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.4.118",
"matchCriteriaId": "0095B9D4-E161-4050-B283-2166CB86CB24"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFE6B3A8-0601-44EA-AD9B-3BDDE6654FDF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.4.118",
"matchCriteriaId": "0702F9B6-2DAC-4308-8737-9F85AD28E847"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C88DA385-5FAE-49EC-80D6-78F81E7EEC16"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.11.130",
"matchCriteriaId": "AB3A588D-46A9-4EFF-8196-46B7A87F1A2D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F86FF6-AB32-4E51-856A-DDE790C0A9A6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.3.3.148",
"matchCriteriaId": "5D67D8C3-98DA-4B7D-BA7D-AB5F13E627F9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE55F4D-E98B-46D3-B870-041141934CD1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.4.120",
"matchCriteriaId": "6334DE4D-E78B-4582-9C6F-6123DA5192C7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58EB0F2F-FB5C-47D9-9AE6-087AE517B3F9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.4.120",
"matchCriteriaId": "BDF9F3BA-4239-4F4D-A65E-A6752A5420F6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAA74D7-36A1-4494-96A2-BD0D2D6BF22F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.4.120",
"matchCriteriaId": "334BB384-5C29-4D24-9F82-B8EE8D0CA8BF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06B5A85C-3588-4263-B9AD-4E56D3F6CB16"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.5.1.86",
"matchCriteriaId": "3BC7E8C9-62BD-45E2-8A7A-D29A6150622A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2700644E-0940-4D05-B3CA-904D91739E58"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.netgear.com/000065571/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0578",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37220",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-09-03T14:15:41.587",
"lastModified": "2023-09-04T00:06:16.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:44:17.280",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -46,10 +66,603 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:synergy\\/a_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "7C3431BE-8E85-40A8-91D9-A3C03C81BF7A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:synergy\\/a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CEB5432-74EB-4A98-AA18-897CABE4AF26"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:synergy_touch_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "C883E9CF-C77E-4E78-B138-C557D69B583F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:synergy_touch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ADA2E81-0753-44AB-AC4F-6A9A6EE87462"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:synergy_10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "D2658E86-1253-4D31-819C-4BD3A156FCD2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:synergy_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E30ED62-C10D-4752-8404-BCA4041CA751"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:synergy_5_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "888282C2-093E-4A21-87F1-CFF12E2A9576"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:synergy_5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA328B75-2CAA-4871-8A20-245916DC6166"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:sy-910_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "BE281DA3-A762-4FB7-B12F-7BA67DE32926"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:sy-910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24057D19-A18A-4E61-8FCD-A15A8D265A2E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:synergy\\/x_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "D52D69C8-55F7-4859-9329-165CDB166660"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:synergy\\/x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BBCCEE9-20C5-4370-9D41-62C0B48863BF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:sy110_face_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "D597621A-1DA4-477F-BDEC-4044E0CB850D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:sy110_face:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBD33F72-88A6-4B49-9774-740CF8AEFE80"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:bioentry-w2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "D80201F0-07BF-4223-A783-9602B248B6DB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:bioentry-w2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D4DEC1-E370-43FD-A1C1-26DE3DE1ACFA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:biolite-n2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "B2DACD2A-973E-48D4-8125-C03AB69F6FA0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:biolite-n2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE274DA-B3DE-450D-B658-674FECD8E8CC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:bioentry_p2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "B1039971-A3F9-4D30-B0DC-1BC10CEADFCC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:bioentry_p2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DECFB45-A5E5-40D9-8B4F-3E21745E2E48"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:sy-711_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "DC588814-31C4-436A-ACF4-469BC3644BB8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:sy-711:-:*:*:*:*:*:*:*",
"matchCriteriaId": "578030EB-BE02-404C-B5CC-9AC852BBD927"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:sy-715_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "CEFE13E7-D150-472D-B499-92CADAD3FCE8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:sy-715:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C967103-DD12-469C-BF9A-7E6BE34BE6B8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:sy-751_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "69B64275-4D2E-4F1A-B161-1B6DC2EAC5C9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:sy-751:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAE8AD6-3D27-44EA-9DF5-41F8B0A74304"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:sy-755_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "FBCD98CD-CF12-435E-849F-C1CAF3ACEC8A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:sy-755:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0DA4BD0-7918-4215-AC4F-D7EB4421ECD8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:sy-777_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "6F49A59F-DA31-440D-B8ED-9B85E1F7CAF1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:sy-777:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24A9A9AE-5A7F-4CCB-B4E7-2E017E5C1D73"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:sy-785_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "C9B5E591-3701-406E-9586-1BDF0261019B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:sy-785:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCAEFF5E-1E8F-470D-A245-40C8D1599E20"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:sy-765_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "91C402A4-80BC-4D5A-96BA-EC12F9DB53AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:sy-765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96141CF0-78B4-4377-826B-641AF2ED29EC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:sy-7500_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "70544D8B-A6AB-4BCA-B548-A2CAD88493B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:sy-7500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01B54814-8CCC-44E2-A21D-4F8E34667292"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:sy-745_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "25FE0B6C-2F3D-4390-AAC7-2DE37A2FE44D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:sy-745:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAFFB4FB-8C79-40BC-B211-DD025A20FB0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:sy-780_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "BA44D700-855C-4B6C-8664-308F09DA4986"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:sy-780:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FDF3F5D-DF58-4F92-B825-AEB9BF0B4FCF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synel:synergy_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3015.1",
"matchCriteriaId": "8D3E71AC-D176-4783-AFD6-4A447F04333B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synel:synergy:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD9C87F1-50E6-4A22-8599-24D9C3804F59"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37221",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-09-03T14:15:42.550",
"lastModified": "2023-09-04T00:06:16.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:44:46.410",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:7-twenty:bot:*:*:*:*:*:*:*:*",
"versionEndExcluding": "202308a1",
"matchCriteriaId": "80810BF2-3DFE-4631-ADD1-17871DF922A3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37222",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-09-03T15:15:12.520",
"lastModified": "2023-09-04T00:06:16.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:45:02.367",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -46,10 +66,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:farsight:provide_server:14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC9DD83-BC04-49E0-97CF-98CCF19A5742"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-37454",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-06T17:15:14.240",
"lastModified": "2023-07-12T13:45:51.407",
"vulnStatus": "Analyzed",
"lastModified": "2023-09-07T16:15:07.930",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the Linux kernel through 6.4.2. A crafted UDF filesystem image causes a use-after-free write operation in the udf_put_super and udf_close_lvid functions in fs/udf/super.c."
"value": "An issue was discovered in the Linux kernel through 6.4.2. A crafted UDF filesystem image causes a use-after-free write operation in the udf_put_super and udf_close_lvid functions in fs/udf/super.c. NOTE: the suse.com reference has a different perspective about this."
}
],
"metrics": {
@ -65,6 +65,10 @@
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-37454",
"source": "cve@mitre.org"
},
{
"url": "https://lore.kernel.org/all/00000000000056e02f05dfb6e11a@google.com/T/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3703",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-09-03T15:15:14.647",
"lastModified": "2023-09-04T00:06:16.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:45:19.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -46,10 +66,555 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m357-5g_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "835E4659-7C5F-4B6B-95B7-A46605F01D06"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m357-5g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "233F2AE1-D6DA-407A-B940-A5BE7CC58D4C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m357-ai_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "D059244D-509B-4F7F-BC11-271C28321DEF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m357-ai:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E26D41B5-3B1B-4895-B23E-EDE411726FB2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m350-5g_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "7A9EF7D0-C26E-44A8-9932-26A04E5406C7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m350-5g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12B8B8DB-A84E-4D5B-8D02-6E80B40BAD21"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m350-w5g_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "0C40BED2-FB3A-4D1D-9216-BE1F02B93EA7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m350-w5g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF36D4F0-CB96-47D6-B682-19FF835A4A4D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m350-6_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1C39B0-3E30-4808-B65F-DA008CCFEFE0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m350-6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E270B250-141D-4A29-AD27-C71EE0FE56EC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m350-w6_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "F337B965-D74E-4771-8B55-F0D4D321DD45"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m350-w6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB098DC2-765E-4E4E-B94A-685AF2976C57"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m331_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "04A50464-B8A1-43F6-9B88-2DDB673F0BDE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m331:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFAAC90A-593E-447A-8D30-1A57F7793B85"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m330-w_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "D7626483-0F76-4D7A-A99D-802862E155FB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m330-w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97FA2A2C-DAAB-496B-8990-A7BDC5D18797"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m330-w5_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "9516C62B-E66F-4056-A7BD-627E0F7E0084"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m330-w5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F461483B-16BA-4FA6-A0B1-63B72437BEB1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m301-g_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "AB1D9C45-EFA4-4823-91EA-9661AAFDD7E0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m301-g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3566DAC8-4B3F-4107-90F5-AF917B68579E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m301-gw_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "38625B15-BB68-49A7-BA02-E94871FB1CA6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m301-gw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4963355-5F5C-4426-AE33-3E8E19FE6824"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m560-5g_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "1D0AEDE2-6613-4BA6-9E39-338405E0758A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m560-5g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A577ED3B-04F2-4B2F-A179-E8772D68CF14"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:m360-p_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "A45788AE-B62C-4FB7-B4F5-5E4891E97A0A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:m360-p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A00751EB-51EE-4727-8E53-E33686920325"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:a551i-f1_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "305A9A1A-581B-4750-BBD6-07AAB3B24440"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:a551i-f1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2EFD3D3-D02E-4A97-8189-D741AF736B25"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:a552i-f1_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "4F29F4DF-3D21-436A-BC0D-2D457F8FDE35"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:a552i-f1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A6FDB56-21B2-4800-84F9-2C0C97B96479"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:a510-f1_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "20ABAC88-B15F-475C-937D-5BA80478AF87"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:a510-f1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40972D4D-B9FE-4DCB-BB90-85287E1E4495"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:a520i-f1_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B534CA-0E57-4451-B468-0CF6E1C18570"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:a520i-f1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69B3CCC0-E236-4156-99FA-F28F2924CF0B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:a551i-f4_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "FA309474-B7C7-4C98-89EF-557359FF018F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:a551i-f4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE775CC0-EA55-4E15-A4FE-8E0FEE9CED0A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:a543i-l1_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "AC7FBF6F-34A7-4C24-BD00-74715CC7FE9C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:a543i-l1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "739EB454-8B3D-4BEB-B157-73059B9929AF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:proscend:a510-l1_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "BA8EA0E7-6FD2-403A-90DF-8DB2DCF69AA0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:proscend:a510-l1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D511624-E7F4-4099-91A3-8C69D4DFD673"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39352",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T21:15:07.873",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T16:10:53.947",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,49 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.11.0",
"matchCriteriaId": "80B02150-FC4E-43F5-A3DF-D8E585200977"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freerdp:freerdp:3.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "D8720D61-0B0D-40ED-B3C4-B452D83BF3C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freerdp:freerdp:3.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "18A75D02-0E7A-4AAF-8E23-0CDCB1733FEA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gfx.c#L1219-L1239",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39356",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T21:15:08.390",
"lastModified": "2023-09-01T07:32:13.003",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T16:09:59.797",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,22 +66,63 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.11.0",
"matchCriteriaId": "80B02150-FC4E-43F5-A3DF-D8E585200977"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freerdp:freerdp:3.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "D8720D61-0B0D-40ED-B3C4-B452D83BF3C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:freerdp:freerdp:3.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "18A75D02-0E7A-4AAF-8E23-0CDCB1733FEA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/include/freerdp/primary.h#L186-L196",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/core/orders.c#L1503-L1504",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gdi.c#L723C1-L758",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39369",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-09-03T15:15:13.537",
"lastModified": "2023-09-04T00:06:16.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:44:36.470",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -46,10 +66,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:startrinity:softswitch:2023-02-16:*:*:*:*:*:*:*",
"matchCriteriaId": "805C8B36-FA85-4B61-AAE1-F37B65D77DAA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39373",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-09-03T15:15:14.283",
"lastModified": "2023-09-04T00:06:16.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:56:48.853",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -46,10 +66,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hyundai:hyundai_2017_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A6BF504-AD65-421C-990B-E97FF2C5EB65"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hyundai:hyundai_2017:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02FE7193-8BFD-4CD7-BE7D-6C6ABF28AEAF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39711",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-07T15:15:07.697",
"lastModified": "2023-09-07T15:15:07.697",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-40060",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2023-09-07T16:15:08.227",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified within Serv-U 15.4 and 15.4 Hotfix 1 that, if exploited, allows an actor to bypass multi-factor/two-factor authentication. The actor must have administrator-level access to Serv-U to perform this action. \n15.4.\u00a0 SolarWinds found that the issue was not completely fixed in 15.4 Hotfix 1.\u00a0"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://support.solarwinds.com/SuccessCenter/s/article/Serv-U-15-4-0-Hotfix-2?language=en_US",
"source": "psirt@solarwinds.com"
},
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40060",
"source": "psirt@solarwinds.com"
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40942",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-07T15:15:07.767",
"lastModified": "2023-09-07T15:15:07.767",
"vulnStatus": "Received",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,19 +2,77 @@
"id": "CVE-2023-40980",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-01T16:15:08.523",
"lastModified": "2023-09-01T21:15:30.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:11:53.560",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in DWSurvey DWSurvey-OSS v.3.2.0 and before allows a remote attacker to execute arbitrary code via the saveimage method and savveFile in the action/UploadAction.java file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:diaowen:dwsurvey:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.2.0",
"matchCriteriaId": "28413AA7-B86B-47F2-B3ED-E77F485F24E2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wkeyuan/DWSurvey/issues/107",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,27 +2,90 @@
"id": "CVE-2023-41364",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-01T10:15:08.343",
"lastModified": "2023-09-01T11:47:50.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:36:32.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In tine through 2023.01.14.325, the sort parameter of the /index.php endpoint allows SQL Injection."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:metaways:tine:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2023.01.14.325",
"matchCriteriaId": "EA85E074-38F1-4B40-AD8C-AC504B509452"
}
]
}
]
}
],
"references": [
{
"url": "https://herolab.usd.de/security-advisories/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://herolab.usd.de/security-advisories/usd-2023-0002/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.tine-groupware.de/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4378",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-01T11:15:43.113",
"lastModified": "2023-09-01T11:47:43.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T16:53:05.920",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -46,14 +76,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"versionStartIncluding": "11.8.0",
"versionEndExcluding": "16.1.5",
"matchCriteriaId": "593DB34F-FA65-443F-B5E8-D6C2FA38EC1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "11.8.0",
"versionEndExcluding": "16.1.5",
"matchCriteriaId": "BF3A9B30-D096-478C-A38E-BC0620852F65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "16.2.5",
"matchCriteriaId": "18116007-7452-495F-80A1-39499882656E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "16.2.5",
"matchCriteriaId": "4E03E8BA-63C8-47D5-B5A1-26DF199E1F65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:community:*:*:*",
"matchCriteriaId": "EE9B8DE8-9990-494B-BDBE-F867DDBB9D57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:16.3.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "08D6B555-39B6-493D-8460-3DC998BAF651"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/422134",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://hackerone.com/reports/2104591",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4587",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-09-04T12:15:10.760",
"lastModified": "2023-09-05T06:50:39.603",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:37:10.870",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
@ -46,10 +76,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zkteco:zem800_firmware:6.60:*:*:*:*:*:*:*",
"matchCriteriaId": "A141C52A-A102-4637-825C-631603AFE047"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zkteco:zem800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "861E1B88-7815-4286-99DE-6AA4E2F27AAA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/insecure-direct-object-reference-zkteco-zem800",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4704",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-01T10:15:08.587",
"lastModified": "2023-09-01T11:47:50.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-07T17:36:22.737",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -36,8 +58,18 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-610"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +78,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:instantcms:instantcms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.16.1",
"matchCriteriaId": "56EF3F9B-6CDB-4568-AF80-EEF6D72B72F6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/instantsoft/icms2/commit/bc22d89691fdaf38055eba13dda8d959b16fa731",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.dev/bounties/4a54134d-df1f-43d4-9b14-45f023cd654a",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-07T16:00:24.858095+00:00
2023-09-07T18:00:26.095907+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-07T15:55:50.960000+00:00
2023-09-07T17:58:03.400000+00:00
```
### Last Data Feed Release
@ -29,63 +29,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
224472
224474
```
### CVEs added in the last Commit
Recently added CVEs: `19`
Recently added CVEs: `2`
* [CVE-2021-44189](CVE-2021/CVE-2021-441xx/CVE-2021-44189.json) (`2023-09-07T14:15:07.843`)
* [CVE-2021-44190](CVE-2021/CVE-2021-441xx/CVE-2021-44190.json) (`2023-09-07T14:15:08.187`)
* [CVE-2021-44191](CVE-2021/CVE-2021-441xx/CVE-2021-44191.json) (`2023-09-07T14:15:08.383`)
* [CVE-2021-44192](CVE-2021/CVE-2021-441xx/CVE-2021-44192.json) (`2023-09-07T14:15:08.573`)
* [CVE-2021-44193](CVE-2021/CVE-2021-441xx/CVE-2021-44193.json) (`2023-09-07T14:15:08.750`)
* [CVE-2021-44194](CVE-2021/CVE-2021-441xx/CVE-2021-44194.json) (`2023-09-07T14:15:08.943`)
* [CVE-2021-44195](CVE-2021/CVE-2021-441xx/CVE-2021-44195.json) (`2023-09-07T14:15:09.147`)
* [CVE-2022-30637](CVE-2022/CVE-2022-306xx/CVE-2022-30637.json) (`2023-09-07T14:15:09.323`)
* [CVE-2022-30638](CVE-2022/CVE-2022-306xx/CVE-2022-30638.json) (`2023-09-07T14:15:09.487`)
* [CVE-2022-30639](CVE-2022/CVE-2022-306xx/CVE-2022-30639.json) (`2023-09-07T14:15:09.690`)
* [CVE-2022-30640](CVE-2022/CVE-2022-306xx/CVE-2022-30640.json) (`2023-09-07T14:15:09.930`)
* [CVE-2022-30641](CVE-2022/CVE-2022-306xx/CVE-2022-30641.json) (`2023-09-07T14:15:10.057`)
* [CVE-2022-30642](CVE-2022/CVE-2022-306xx/CVE-2022-30642.json) (`2023-09-07T14:15:10.253`)
* [CVE-2022-30643](CVE-2022/CVE-2022-306xx/CVE-2022-30643.json) (`2023-09-07T14:15:10.430`)
* [CVE-2022-30644](CVE-2022/CVE-2022-306xx/CVE-2022-30644.json) (`2023-09-07T14:15:10.707`)
* [CVE-2022-30645](CVE-2022/CVE-2022-306xx/CVE-2022-30645.json) (`2023-09-07T14:15:10.910`)
* [CVE-2022-30646](CVE-2022/CVE-2022-306xx/CVE-2022-30646.json) (`2023-09-07T14:15:11.183`)
* [CVE-2023-39711](CVE-2023/CVE-2023-397xx/CVE-2023-39711.json) (`2023-09-07T15:15:07.697`)
* [CVE-2023-40942](CVE-2023/CVE-2023-409xx/CVE-2023-40942.json) (`2023-09-07T15:15:07.767`)
* [CVE-2023-30800](CVE-2023/CVE-2023-308xx/CVE-2023-30800.json) (`2023-09-07T16:15:07.670`)
* [CVE-2023-40060](CVE-2023/CVE-2023-400xx/CVE-2023-40060.json) (`2023-09-07T16:15:08.227`)
### CVEs modified in the last Commit
Recently modified CVEs: `40`
Recently modified CVEs: `45`
* [CVE-2023-20837](CVE-2023/CVE-2023-208xx/CVE-2023-20837.json) (`2023-09-07T14:39:00.457`)
* [CVE-2023-20838](CVE-2023/CVE-2023-208xx/CVE-2023-20838.json) (`2023-09-07T14:41:14.693`)
* [CVE-2023-20839](CVE-2023/CVE-2023-208xx/CVE-2023-20839.json) (`2023-09-07T14:41:27.213`)
* [CVE-2023-20843](CVE-2023/CVE-2023-208xx/CVE-2023-20843.json) (`2023-09-07T14:41:36.843`)
* [CVE-2023-20844](CVE-2023/CVE-2023-208xx/CVE-2023-20844.json) (`2023-09-07T14:41:45.870`)
* [CVE-2023-20845](CVE-2023/CVE-2023-208xx/CVE-2023-20845.json) (`2023-09-07T14:41:57.077`)
* [CVE-2023-20846](CVE-2023/CVE-2023-208xx/CVE-2023-20846.json) (`2023-09-07T14:42:09.063`)
* [CVE-2023-32812](CVE-2023/CVE-2023-328xx/CVE-2023-32812.json) (`2023-09-07T14:42:25.327`)
* [CVE-2023-32813](CVE-2023/CVE-2023-328xx/CVE-2023-32813.json) (`2023-09-07T14:42:39.470`)
* [CVE-2023-32814](CVE-2023/CVE-2023-328xx/CVE-2023-32814.json) (`2023-09-07T14:42:58.513`)
* [CVE-2023-32815](CVE-2023/CVE-2023-328xx/CVE-2023-32815.json) (`2023-09-07T14:43:12.923`)
* [CVE-2023-32816](CVE-2023/CVE-2023-328xx/CVE-2023-32816.json) (`2023-09-07T14:43:32.837`)
* [CVE-2023-32817](CVE-2023/CVE-2023-328xx/CVE-2023-32817.json) (`2023-09-07T14:43:42.350`)
* [CVE-2023-20847](CVE-2023/CVE-2023-208xx/CVE-2023-20847.json) (`2023-09-07T14:43:55.820`)
* [CVE-2023-20848](CVE-2023/CVE-2023-208xx/CVE-2023-20848.json) (`2023-09-07T14:44:06.117`)
* [CVE-2023-20849](CVE-2023/CVE-2023-208xx/CVE-2023-20849.json) (`2023-09-07T14:44:14.570`)
* [CVE-2023-20850](CVE-2023/CVE-2023-208xx/CVE-2023-20850.json) (`2023-09-07T14:44:28.573`)
* [CVE-2023-40576](CVE-2023/CVE-2023-405xx/CVE-2023-40576.json) (`2023-09-07T14:50:27.893`)
* [CVE-2023-40575](CVE-2023/CVE-2023-405xx/CVE-2023-40575.json) (`2023-09-07T15:18:56.130`)
* [CVE-2023-40574](CVE-2023/CVE-2023-405xx/CVE-2023-40574.json) (`2023-09-07T15:24:25.010`)
* [CVE-2023-40567](CVE-2023/CVE-2023-405xx/CVE-2023-40567.json) (`2023-09-07T15:28:46.033`)
* [CVE-2023-40188](CVE-2023/CVE-2023-401xx/CVE-2023-40188.json) (`2023-09-07T15:30:37.297`)
* [CVE-2023-40187](CVE-2023/CVE-2023-401xx/CVE-2023-40187.json) (`2023-09-07T15:40:05.617`)
* [CVE-2023-40186](CVE-2023/CVE-2023-401xx/CVE-2023-40186.json) (`2023-09-07T15:48:23.590`)
* [CVE-2023-40181](CVE-2023/CVE-2023-401xx/CVE-2023-40181.json) (`2023-09-07T15:55:50.960`)
* [CVE-2023-39356](CVE-2023/CVE-2023-393xx/CVE-2023-39356.json) (`2023-09-07T16:09:59.797`)
* [CVE-2023-39352](CVE-2023/CVE-2023-393xx/CVE-2023-39352.json) (`2023-09-07T16:10:53.947`)
* [CVE-2023-37454](CVE-2023/CVE-2023-374xx/CVE-2023-37454.json) (`2023-09-07T16:15:07.930`)
* [CVE-2023-39711](CVE-2023/CVE-2023-397xx/CVE-2023-39711.json) (`2023-09-07T16:25:45.377`)
* [CVE-2023-40942](CVE-2023/CVE-2023-409xx/CVE-2023-40942.json) (`2023-09-07T16:25:45.377`)
* [CVE-2023-40239](CVE-2023/CVE-2023-402xx/CVE-2023-40239.json) (`2023-09-07T16:26:26.913`)
* [CVE-2023-25488](CVE-2023/CVE-2023-254xx/CVE-2023-25488.json) (`2023-09-07T16:34:31.380`)
* [CVE-2023-25477](CVE-2023/CVE-2023-254xx/CVE-2023-25477.json) (`2023-09-07T16:34:40.223`)
* [CVE-2023-4378](CVE-2023/CVE-2023-43xx/CVE-2023-4378.json) (`2023-09-07T16:53:05.920`)
* [CVE-2023-36187](CVE-2023/CVE-2023-361xx/CVE-2023-36187.json) (`2023-09-07T17:05:35.237`)
* [CVE-2023-1555](CVE-2023/CVE-2023-15xx/CVE-2023-1555.json) (`2023-09-07T17:11:04.963`)
* [CVE-2023-40980](CVE-2023/CVE-2023-409xx/CVE-2023-40980.json) (`2023-09-07T17:11:53.560`)
* [CVE-2023-1279](CVE-2023/CVE-2023-12xx/CVE-2023-1279.json) (`2023-09-07T17:15:09.363`)
* [CVE-2023-0120](CVE-2023/CVE-2023-01xx/CVE-2023-0120.json) (`2023-09-07T17:27:27.283`)
* [CVE-2023-4704](CVE-2023/CVE-2023-47xx/CVE-2023-4704.json) (`2023-09-07T17:36:22.737`)
* [CVE-2023-41364](CVE-2023/CVE-2023-413xx/CVE-2023-41364.json) (`2023-09-07T17:36:32.723`)
* [CVE-2023-4587](CVE-2023/CVE-2023-45xx/CVE-2023-4587.json) (`2023-09-07T17:37:10.870`)
* [CVE-2023-37220](CVE-2023/CVE-2023-372xx/CVE-2023-37220.json) (`2023-09-07T17:44:17.280`)
* [CVE-2023-39369](CVE-2023/CVE-2023-393xx/CVE-2023-39369.json) (`2023-09-07T17:44:36.470`)
* [CVE-2023-37221](CVE-2023/CVE-2023-372xx/CVE-2023-37221.json) (`2023-09-07T17:44:46.410`)
* [CVE-2023-37222](CVE-2023/CVE-2023-372xx/CVE-2023-37222.json) (`2023-09-07T17:45:02.367`)
* [CVE-2023-3703](CVE-2023/CVE-2023-37xx/CVE-2023-3703.json) (`2023-09-07T17:45:19.270`)
* [CVE-2023-39373](CVE-2023/CVE-2023-393xx/CVE-2023-39373.json) (`2023-09-07T17:56:48.853`)
* [CVE-2023-24674](CVE-2023/CVE-2023-246xx/CVE-2023-24674.json) (`2023-09-07T17:58:01.300`)
* [CVE-2023-20200](CVE-2023/CVE-2023-202xx/CVE-2023-20200.json) (`2023-09-07T17:58:03.400`)
## Download and Usage