Auto-Update: 2023-05-17 20:00:44.199443+00:00

This commit is contained in:
cad-safe-bot 2023-05-17 20:00:47 +00:00
parent eb254268dc
commit 237d59f764
32 changed files with 4143 additions and 133 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25147",
"sourceIdentifier": "security@apache.org",
"published": "2023-01-31T16:15:08.907",
"lastModified": "2023-02-07T21:46:35.950",
"lastModified": "2023-05-17T19:42:25.360",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -17,20 +17,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 2.5
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0007",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2023-05-10T17:15:08.910",
"lastModified": "2023-05-11T13:36:34.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T19:50:00.107",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
@ -46,10 +76,75 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.25",
"matchCriteriaId": "5C73941F-EBEE-4A03-94A4-B4C7C96E4963"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndExcluding": "9.0.17",
"matchCriteriaId": "89A55C5F-8E01-42C4-BE93-D683900C07BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.1.0",
"versionEndExcluding": "9.1.16",
"matchCriteriaId": "56181B13-327B-4249-A7E8-246B2420CEFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.0.7",
"matchCriteriaId": "3F183A33-114C-4A74-ACEF-51C176B3487F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:panorama_m-200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C62FBF7-0D37-4CA1-872B-7B6BA3702890"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:panorama_m-500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC66517-BD14-47D9-8CCF-09F325226C23"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:panorama_m-600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82EAD013-E74C-43A6-BE16-B4F6950A0F88"
}
]
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2023-0007",
"source": "psirt@paloaltonetworks.com"
"source": "psirt@paloaltonetworks.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0008",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2023-05-10T17:15:09.040",
"lastModified": "2023-05-11T18:15:11.093",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T19:43:56.483",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
},
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-610"
}
]
},
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
@ -46,10 +76,72 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.25",
"matchCriteriaId": "5C73941F-EBEE-4A03-94A4-B4C7C96E4963"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndExcluding": "9.0.17",
"matchCriteriaId": "89A55C5F-8E01-42C4-BE93-D683900C07BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.1.0",
"versionEndExcluding": "9.1.16",
"matchCriteriaId": "56181B13-327B-4249-A7E8-246B2420CEFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.0.12",
"matchCriteriaId": "71F1F86A-8158-4BE8-B509-5F50421DA829"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.1.0",
"versionEndExcluding": "10.1.10",
"matchCriteriaId": "8F25D99D-0E7C-469B-977E-FCBD0AB2373E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.2.0",
"versionEndExcluding": "10.2.4",
"matchCriteriaId": "D61F01F8-1598-4078-9D98-BFF5B62F3BA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F3693A5-182E-4723-BE2A-062D0C9E736C"
}
]
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2023-0008",
"source": "psirt@paloaltonetworks.com"
"source": "psirt@paloaltonetworks.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20046",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-05-09T18:15:11.697",
"lastModified": "2023-05-09T18:23:37.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:11:46.627",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -34,14 +54,137 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"versionEndExcluding": "21.22.14",
"matchCriteriaId": "1280E939-FA8A-49E4-AE06-616B152929CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.23.0",
"versionEndExcluding": "21.23.31",
"matchCriteriaId": "5A2C7A63-E17A-487D-8CCF-3346FDA2859F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.25.0",
"versionEndExcluding": "21.25.15",
"matchCriteriaId": "1B58A574-77D9-4EC5-9D57-8D244EF7BDB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.26.0",
"versionEndExcluding": "21.26.17",
"matchCriteriaId": "E9507CCB-0340-40D6-AAF3-D2EA3D3EE408"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.27.0",
"versionEndExcluding": "21.27.6",
"matchCriteriaId": "0D9F9D50-DA13-410A-9571-6FA9436165E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
"versionStartIncluding": "21.28.0",
"versionEndExcluding": "21.28.3",
"matchCriteriaId": "833F9A52-2976-4F2C-AA87-FD50BB83BB3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:21.23.n:*:*:*:*:*:*:*",
"matchCriteriaId": "CD63EE8D-0389-4589-BF86-0F64A8AEDA13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:21.24:*:*:*:*:*:*:*",
"matchCriteriaId": "A0534E44-1CD6-49CB-A574-D7B2CF14CC25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:21.27.m:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1BBD53-BF16-4841-9D20-D2C4129A337B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:staros:21.28.m:*:*:*:*:*:*:*",
"matchCriteriaId": "47DCE4FD-48D4-4B25-BBAE-24D270627FCD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "746254AC-B039-432C-AA5C-A82260E57AD7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "301681DF-2A9E-4A91-9918-4A46153ADC01"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9EF0299-16A7-446D-855D-BFF91EE65534"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vpc-di:-:*:*:*:*:*:*:*",
"matchCriteriaId": "775B2FC4-E182-47F8-B786-EC6A359BCCE3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vpc-si:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFD5A5BE-9B00-4E4F-A4A4-FBEF990F4C39"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-j7p3-gjw6-pp4r",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20098",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-05-09T18:15:11.760",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:20:40.713",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -34,14 +54,56 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*",
"versionEndExcluding": "20.9.1",
"matchCriteriaId": "7B412E61-DA38-4890-ABF8-0875F5D0797D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:20.11:*:*:*:*:*:*:*",
"matchCriteriaId": "684A8784-B40F-4C49-AFD8-66B1B5E4CA20"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-5j43-q336-92ch",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-wfnqmYhN",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2250",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-04-24T21:15:09.410",
"lastModified": "2023-05-04T14:41:52.360",
"lastModified": "2023-05-17T19:57:05.427",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -17,19 +17,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2310",
"sourceIdentifier": "security@selinc.com",
"published": "2023-05-10T20:15:09.637",
"lastModified": "2023-05-11T13:36:30.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T19:47:46.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -46,10 +76,305 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-2241_rtac_module_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r113-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "92EC2190-5E06-429E-A06A-76571E7ED430"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-2241_rtac_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4A1AB9-1190-4620-BF97-4A5569E74310"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r148-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "490EC90A-C8C4-4AEA-90E8-DA1C6D11932C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA7F410-7F74-4EF1-913E-7B34674716DC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r119-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "2161BCBC-6892-47E6-9A9F-0A82F0AA6A92"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14D78E73-46F2-4D00-A75B-909752E36EB4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505-3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "39E788ED-56DC-455E-B907-9DA7ED359CB9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505-3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A479C2B-F691-4E04-B551-9F631E5A2A0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r100-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "4A438B8C-AD18-47F5-94BF-2484D778EA75"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E56BC08-9C49-4614-8F52-3413B804A128"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530-4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r108-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "C48D1C36-0F34-4A95-88E2-B69DE8803AF7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB424E1B-2AE3-449E-9AA1-2AF48C1920FB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "A9982B6A-2CED-4EF4-946D-E4B8A8CE3935"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E573857F-C6DC-4E59-8F5B-4C51ED4D69DB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r134-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "9333068D-CE59-4644-879F-A1B29D07C26B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*",
"matchCriteriaId": "282F6DB1-4B0F-424F-B5E4-0827F1E7EE6F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r144-v2",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "9BF86940-89E4-4D3C-B51D-CF189B8B20A3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3EB8694-DC56-4E35-9659-B2787F872E08"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r144-v2",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "28EAFD3D-1697-42BA-941E-2970A1177302"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D2A4A4-B81E-4034-863D-900D95166543"
}
]
}
]
}
],
"references": [
{
"url": "https://selinc.com/support/security-notifications/external-reports/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-24805",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-17T18:15:09.177",
"lastModified": "2023-05-17T18:15:09.177",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-26044",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-17T18:15:09.247",
"lastModified": "2023-05-17T18:15:09.247",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "react/http is an event-driven, streaming HTTP client and server implementation for ReactPHP. Previous versions of ReactPHP's HTTP server component contain a potential DoS vulnerability that can cause high CPU load when processing large HTTP request bodies. This vulnerability has little to no impact on the default configuration, but can be exploited when explicitly using the RequestBodyBufferMiddleware with very large settings. This might lead to consuming large amounts of CPU time for processing requests and significantly delay or slow down the processing of legitimate user requests. This issue has been addressed in release 1.9.0. Users are advised to upgrade. Users unable to upgrade may keep the request body limited using RequestBodyBufferMiddleware with a sensible value which should mitigate the issue. An infrastructure or DevOps workaround could be to place a reverse proxy in front of the ReactPHP HTTP server to filter out any excessive HTTP request bodies.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://github.com/reactphp/http/commit/9681f764b80c45ebfb5fe2ea7da5bd3babfcdcfd",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/reactphp/http/security/advisories/GHSA-95x4-j7vc-h8mf",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-27562",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T15:15:08.817",
"lastModified": "2023-05-10T15:26:03.940",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:42:50.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The n8n package 0.218.0 for Node.js allows Directory Traversal."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:n8n:n8n:0.218.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "BA67C861-5EEA-42D3-A179-C544F76CAF2F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/n8n-io/n8n/releases",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.synacktiv.com/sites/default/files/2023-05/Synacktiv-N8N-Multiple-Vulnerabilities_0.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-27563",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T15:15:09.483",
"lastModified": "2023-05-10T15:26:03.940",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:47:30.687",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The n8n package 0.218.0 for Node.js allows Escalation of Privileges."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:n8n:n8n:0.218.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "BA67C861-5EEA-42D3-A179-C544F76CAF2F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/n8n-io/n8n/releases",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.synacktiv.com/sites/default/files/2023-05/Synacktiv-N8N-Multiple-Vulnerabilities_0.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-27564",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T15:15:09.660",
"lastModified": "2023-05-10T15:26:03.940",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T19:14:43.370",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The n8n package 0.218.0 for Node.js allows Information Disclosure."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:n8n:n8n:0.218.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "BA67C861-5EEA-42D3-A179-C544F76CAF2F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/n8n-io/n8n/releases",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.synacktiv.com/sites/default/files/2023-05/Synacktiv-N8N-Multiple-Vulnerabilities_0.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-2769",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T18:15:09.317",
"lastModified": "2023-05-17T18:15:09.317",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Service Provider Management System 1.0. This affects an unknown part of the file /classes/Master.php?f=delete_service. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229275."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Serviced-Providerd-Managementd-Systemd--d-SQLd-injections.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.229275",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.229275",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-2770",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T18:15:09.377",
"lastModified": "2023-05-17T18:15:09.377",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in SourceCodester Online Exam System 1.0. This vulnerability affects unknown code of the file /kelasdosen/data. The manipulation of the argument columns[1][data] leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229276."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/tht1997/CVE_2023/blob/main/online_exam/kelasdosen.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.229276",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.229276",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-2771",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T19:15:09.210",
"lastModified": "2023-05-17T19:15:09.210",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in SourceCodester Online Exam System 1.0. This issue affects some unknown processing of the file /jurusanmatkul/data. The manipulation of the argument columns[1][data] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229277 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/tht1997/CVE_2023/blob/main/online_exam/kelasdosen.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.229277",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.229277",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-2772",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T19:15:09.277",
"lastModified": "2023-05-17T19:15:09.277",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Budget and Expense Tracker System 1.0. Affected is an unknown function of the file /admin/budget/manage_budget.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-229278 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/wucwu1/CVEApplication/blob/main/SQL.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.229278",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.229278",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-2773",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T19:15:09.340",
"lastModified": "2023-05-17T19:15:09.340",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://gitee.com/zyz0103/system-vul/blob/master/Bus%20Dispatch%20and%20Information%20System%20in%20adminid%20has%20Sql%20injection%20vulnerabilities.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.229279",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.229279",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29462",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2023-05-09T14:15:13.343",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:26:52.220",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
@ -46,10 +76,36 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:16.00.00:*:*:*:*:*:*:*",
"matchCriteriaId": "B42EE5A3-B6F0-4D21-B3F8-7EBBC5B8A53B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:16.20.01:*:*:*:*:*:*:*",
"matchCriteriaId": "4936FF5A-4C83-43B8-A1EC-43D9ED255EAD"
}
]
}
]
}
],
"references": [
{
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139391",
"source": "PSIRT@rockwellautomation.com"
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-10",
"source": "nvd@nist.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30898",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:18.107",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:38:32.060",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
@ -46,10 +66,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2020:r2:*:*:*:*:*:*",
"matchCriteriaId": "1A37DE78-2274-4A7E-9C88-6BCC3385EB8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2020:r3:*:*:*:*:*:*",
"matchCriteriaId": "6FFC3116-F2BD-4AFF-9700-F9CA306D37D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2021:r1:*:*:*:*:*:*",
"matchCriteriaId": "9AF92046-F73F-4128-9EDB-993856B9880F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2021:r2:*:*:*:*:*:*",
"matchCriteriaId": "CE398796-4965-446D-A318-2E37DF0D653B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2022:r1:*:*:*:*:*:*",
"matchCriteriaId": "6F4A6472-67AE-41E0-9778-F698F8489F48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2022:r2:*:*:*:*:*:*",
"matchCriteriaId": "5B5D26B1-8D4B-418F-88F6-95AB26F4CEF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2022:r3:*:*:*:*:*:*",
"matchCriteriaId": "04958C83-36AF-4365-B94B-56D307F14A41"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2023:r1:*:*:*:*:*:*",
"matchCriteriaId": "5C1C3E3C-16FE-4215-AFC6-DECCDEA858EB"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-789345.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30899",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:18.183",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:37:32.430",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
@ -46,10 +66,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2020:r2:*:*:*:*:*:*",
"matchCriteriaId": "1A37DE78-2274-4A7E-9C88-6BCC3385EB8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2020:r3:*:*:*:*:*:*",
"matchCriteriaId": "6FFC3116-F2BD-4AFF-9700-F9CA306D37D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2021:r1:*:*:*:*:*:*",
"matchCriteriaId": "9AF92046-F73F-4128-9EDB-993856B9880F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2021:r2:*:*:*:*:*:*",
"matchCriteriaId": "CE398796-4965-446D-A318-2E37DF0D653B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2022:r1:*:*:*:*:*:*",
"matchCriteriaId": "6F4A6472-67AE-41E0-9778-F698F8489F48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2022:r2:*:*:*:*:*:*",
"matchCriteriaId": "5B5D26B1-8D4B-418F-88F6-95AB26F4CEF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2022:r3:*:*:*:*:*:*",
"matchCriteriaId": "04958C83-36AF-4365-B94B-56D307F14A41"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:siveillance_video:2023:r1:*:*:*:*:*:*",
"matchCriteriaId": "5C1C3E3C-16FE-4215-AFC6-DECCDEA858EB"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-789345.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30985",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:18.267",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:38:56.983",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
@ -46,10 +66,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2023:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60B92DC2-5A0D-4F6E-81FD-3A0CA25B0D32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2023:update_0001:*:*:*:*:*:*:*",
"matchCriteriaId": "E10B6B37-8C69-47B6-A4B8-DDBA562F083E"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-932528.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30986",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:18.350",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:37:02.453",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -36,8 +36,18 @@
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,10 +56,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2023:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60B92DC2-5A0D-4F6E-81FD-3A0CA25B0D32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:solid_edge_se2023:update_0001:*:*:*:*:*:*:*",
"matchCriteriaId": "E10B6B37-8C69-47B6-A4B8-DDBA562F083E"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-932528.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-31135",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-17T18:15:09.437",
"lastModified": "2023-05-17T18:15:09.437",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Dgraph is an open source distributed GraphQL database. Existing Dgraph audit logs are vulnerable to brute force attacks due to nonce collisions. The first 12 bytes come from a baseIv which is initialized when an audit log is created. The last 4 bytes come from the length of the log line being encrypted. This is problematic because two log lines will often have the same length, so due to these collisions we are reusing the same nonce many times. All audit logs generated by versions of Dgraph <v23.0.0 are affected. Attackers must have access to the system the logs are stored on. Dgraph users should upgrade to v23.0.0. Users unable to upgrade should store existing audit logs in a secure location and for extra security, encrypt using an external tool like `gpg`."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
],
"references": [
{
"url": "https://en.wikipedia.org/wiki/Cryptographic_nonce",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/dgraph-io/dgraph/pull/8323",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/dgraph-io/dgraph/security/advisories/GHSA-92wq-q9pq-gw47",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31148",
"sourceIdentifier": "security@selinc.com",
"published": "2023-05-10T20:15:09.847",
"lastModified": "2023-05-11T13:36:30.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:07:50.813",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -46,14 +76,312 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-2241_rtac_module_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "5D2D202A-9B85-4BA0-8FE4-A6F71F369E8D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-2241_rtac_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4A1AB9-1190-4620-BF97-4A5569E74310"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r148-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "490EC90A-C8C4-4AEA-90E8-DA1C6D11932C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA7F410-7F74-4EF1-913E-7B34674716DC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "65D15943-DDAB-446D-9179-CEEEF7EDA5BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14D78E73-46F2-4D00-A75B-909752E36EB4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505-3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "39E788ED-56DC-455E-B907-9DA7ED359CB9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505-3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A479C2B-F691-4E04-B551-9F631E5A2A0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "B4821D90-2614-48D3-AFFC-B65C94E8968C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E56BC08-9C49-4614-8F52-3413B804A128"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530-4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "0E6F4CFF-173F-4B68-8296-6F3713F98460"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB424E1B-2AE3-449E-9AA1-2AF48C1920FB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "A9982B6A-2CED-4EF4-946D-E4B8A8CE3935"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E573857F-C6DC-4E59-8F5B-4C51ED4D69DB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r134-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "9333068D-CE59-4644-879F-A1B29D07C26B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*",
"matchCriteriaId": "282F6DB1-4B0F-424F-B5E4-0827F1E7EE6F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r144-v2",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "9BF86940-89E4-4D3C-B51D-CF189B8B20A3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3EB8694-DC56-4E35-9659-B2787F872E08"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r144-v2",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "28EAFD3D-1697-42BA-941E-2970A1177302"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D2A4A4-B81E-4034-863D-900D95166543"
}
]
}
]
}
],
"references": [
{
"url": "https://selinc.com/support/security-notifications/external-reports/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.nozominetworks.com/blog/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31149",
"sourceIdentifier": "security@selinc.com",
"published": "2023-05-10T20:15:09.947",
"lastModified": "2023-05-11T13:36:30.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:16:25.090",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -46,14 +76,312 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-2241_rtac_module_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "5D2D202A-9B85-4BA0-8FE4-A6F71F369E8D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-2241_rtac_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4A1AB9-1190-4620-BF97-4A5569E74310"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r148-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "490EC90A-C8C4-4AEA-90E8-DA1C6D11932C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA7F410-7F74-4EF1-913E-7B34674716DC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "65D15943-DDAB-446D-9179-CEEEF7EDA5BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14D78E73-46F2-4D00-A75B-909752E36EB4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505-3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "39E788ED-56DC-455E-B907-9DA7ED359CB9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505-3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A479C2B-F691-4E04-B551-9F631E5A2A0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "B4821D90-2614-48D3-AFFC-B65C94E8968C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E56BC08-9C49-4614-8F52-3413B804A128"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530-4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "0E6F4CFF-173F-4B68-8296-6F3713F98460"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB424E1B-2AE3-449E-9AA1-2AF48C1920FB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "A9982B6A-2CED-4EF4-946D-E4B8A8CE3935"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E573857F-C6DC-4E59-8F5B-4C51ED4D69DB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r134-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "9333068D-CE59-4644-879F-A1B29D07C26B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*",
"matchCriteriaId": "282F6DB1-4B0F-424F-B5E4-0827F1E7EE6F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r144-v2",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "9BF86940-89E4-4D3C-B51D-CF189B8B20A3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3EB8694-DC56-4E35-9659-B2787F872E08"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r144-v2",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "28EAFD3D-1697-42BA-941E-2970A1177302"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D2A4A4-B81E-4034-863D-900D95166543"
}
]
}
]
}
],
"references": [
{
"url": "https://selinc.com/support/security-notifications/external-reports/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.nozominetworks.com/blog/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31150",
"sourceIdentifier": "security@selinc.com",
"published": "2023-05-10T20:15:10.043",
"lastModified": "2023-05-11T13:36:30.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T19:36:26.577",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -46,14 +76,312 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-2241_rtac_module_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r122-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "5E029562-CEA0-4948-8B40-1E98FB4F282B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-2241_rtac_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4A1AB9-1190-4620-BF97-4A5569E74310"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r148-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "490EC90A-C8C4-4AEA-90E8-DA1C6D11932C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA7F410-7F74-4EF1-913E-7B34674716DC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r122-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "433C444E-CE55-41D8-B1B7-85D2AA98BEFA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14D78E73-46F2-4D00-A75B-909752E36EB4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505-3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "39E788ED-56DC-455E-B907-9DA7ED359CB9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505-3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A479C2B-F691-4E04-B551-9F631E5A2A0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r122-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "CBA63C3C-3FF2-4168-9C75-87B3D61975E8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E56BC08-9C49-4614-8F52-3413B804A128"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530-4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r122-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "2F76BC73-5411-48B5-BF0D-E8D64CB21F3B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB424E1B-2AE3-449E-9AA1-2AF48C1920FB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r132-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "A9982B6A-2CED-4EF4-946D-E4B8A8CE3935"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E573857F-C6DC-4E59-8F5B-4C51ED4D69DB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r134-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "9333068D-CE59-4644-879F-A1B29D07C26B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*",
"matchCriteriaId": "282F6DB1-4B0F-424F-B5E4-0827F1E7EE6F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r144-v2",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "9BF86940-89E4-4D3C-B51D-CF189B8B20A3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3EB8694-DC56-4E35-9659-B2787F872E08"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r144-v2",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "28EAFD3D-1697-42BA-941E-2970A1177302"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D2A4A4-B81E-4034-863D-900D95166543"
}
]
}
]
}
],
"references": [
{
"url": "https://selinc.com/support/security-notifications/external-reports/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.nozominetworks.com/blog/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31151",
"sourceIdentifier": "security@selinc.com",
"published": "2023-05-10T20:15:10.147",
"lastModified": "2023-05-11T13:36:30.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:02:45.437",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -46,14 +76,312 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-2241_rtac_module_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "FB329AB0-9D1C-4D59-B8BE-D04DF89B9CB6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-2241_rtac_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4A1AB9-1190-4620-BF97-4A5569E74310"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r148-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "490EC90A-C8C4-4AEA-90E8-DA1C6D11932C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA7F410-7F74-4EF1-913E-7B34674716DC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "20A834EB-DE61-4C04-A2D9-E1650E774DB2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14D78E73-46F2-4D00-A75B-909752E36EB4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505-3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "01FAF35B-5F98-4C36-B4F9-0C86FD4320CA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505-3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A479C2B-F691-4E04-B551-9F631E5A2A0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "6226FB3D-260D-4F8B-B7D3-B9EA50D80855"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E56BC08-9C49-4614-8F52-3413B804A128"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530-4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "EC6D5138-45BB-4297-AAC6-78236C0A1487"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB424E1B-2AE3-449E-9AA1-2AF48C1920FB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "E536C912-E3A2-4344-9162-7E00F8C4298D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E573857F-C6DC-4E59-8F5B-4C51ED4D69DB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "D0646EA5-FC40-4601-8958-47F0255EDA9F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*",
"matchCriteriaId": "282F6DB1-4B0F-424F-B5E4-0827F1E7EE6F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "052FF575-FDDE-4C78-97C5-97D1712F8785"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3EB8694-DC56-4E35-9659-B2787F872E08"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "15CCDC18-5789-4B05-8944-9C87B1F58DEC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D2A4A4-B81E-4034-863D-900D95166543"
}
]
}
]
}
],
"references": [
{
"url": "https://selinc.com/support/security-notifications/external-reports/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.nozominetworks.com/blog/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31152",
"sourceIdentifier": "security@selinc.com",
"published": "2023-05-10T20:15:10.247",
"lastModified": "2023-05-11T13:36:30.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T19:33:57.350",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -46,14 +76,312 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-2241_rtac_module_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "FB329AB0-9D1C-4D59-B8BE-D04DF89B9CB6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-2241_rtac_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4A1AB9-1190-4620-BF97-4A5569E74310"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r148-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "490EC90A-C8C4-4AEA-90E8-DA1C6D11932C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA7F410-7F74-4EF1-913E-7B34674716DC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "20A834EB-DE61-4C04-A2D9-E1650E774DB2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14D78E73-46F2-4D00-A75B-909752E36EB4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505-3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "01FAF35B-5F98-4C36-B4F9-0C86FD4320CA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505-3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A479C2B-F691-4E04-B551-9F631E5A2A0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "6226FB3D-260D-4F8B-B7D3-B9EA50D80855"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E56BC08-9C49-4614-8F52-3413B804A128"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530-4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "EC6D5138-45BB-4297-AAC6-78236C0A1487"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB424E1B-2AE3-449E-9AA1-2AF48C1920FB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "E536C912-E3A2-4344-9162-7E00F8C4298D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E573857F-C6DC-4E59-8F5B-4C51ED4D69DB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "D0646EA5-FC40-4601-8958-47F0255EDA9F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*",
"matchCriteriaId": "282F6DB1-4B0F-424F-B5E4-0827F1E7EE6F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "052FF575-FDDE-4C78-97C5-97D1712F8785"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3EB8694-DC56-4E35-9659-B2787F872E08"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r147-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "15CCDC18-5789-4B05-8944-9C87B1F58DEC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D2A4A4-B81E-4034-863D-900D95166543"
}
]
}
]
}
],
"references": [
{
"url": "https://selinc.com/support/security-notifications/external-reports/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.nozominetworks.com/blog/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31161",
"sourceIdentifier": "security@selinc.com",
"published": "2023-05-10T20:15:11.080",
"lastModified": "2023-05-11T13:36:30.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T19:05:14.183",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -46,14 +76,167 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r148-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "490EC90A-C8C4-4AEA-90E8-DA1C6D11932C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA7F410-7F74-4EF1-913E-7B34674716DC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r143-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "621E04B8-C1E2-4E96-9D7E-9073141CF40A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E573857F-C6DC-4E59-8F5B-4C51ED4D69DB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r143-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "6796FA5F-5EAD-44A7-A82C-3CF8BCAD8784"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*",
"matchCriteriaId": "282F6DB1-4B0F-424F-B5E4-0827F1E7EE6F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r144-v2",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "9BF86940-89E4-4D3C-B51D-CF189B8B20A3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3EB8694-DC56-4E35-9659-B2787F872E08"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r144-v2",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "28EAFD3D-1697-42BA-941E-2970A1177302"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D2A4A4-B81E-4034-863D-900D95166543"
}
]
}
]
}
],
"references": [
{
"url": "https://selinc.com/support/security-notifications/external-reports/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.nozominetworks.com/blog/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31162",
"sourceIdentifier": "security@selinc.com",
"published": "2023-05-10T20:15:11.170",
"lastModified": "2023-05-11T13:36:30.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T19:04:20.050",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
},
{
"source": "security@selinc.com",
"type": "Secondary",
@ -46,14 +76,312 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-2241_rtac_module_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r149-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "8FF5452C-BF96-49EE-8920-4851DFE010CC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-2241_rtac_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4A1AB9-1190-4620-BF97-4A5569E74310"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r149-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "94443363-8BDC-4978-A72D-CBD39742E8E6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA7F410-7F74-4EF1-913E-7B34674716DC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r149-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "7C5DACA5-0C74-48A0-B463-CC496C41CE8E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14D78E73-46F2-4D00-A75B-909752E36EB4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3505-3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r149-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "6DC95CFF-E911-451C-ACC2-7DB88E89A42B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3505-3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A479C2B-F691-4E04-B551-9F631E5A2A0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r149-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "B04F5072-52A5-4FF5-9887-08416D3144C6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E56BC08-9C49-4614-8F52-3413B804A128"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3530-4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r149-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "CFAEDBE0-0C25-4738-BAC5-EDC263EFBB18"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3530-4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB424E1B-2AE3-449E-9AA1-2AF48C1920FB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r149-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "5C36D159-E943-40D6-A427-69DDB99F51A3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E573857F-C6DC-4E59-8F5B-4C51ED4D69DB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r149-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "6E6D8665-C915-4DC8-81F7-2F5D70E9484F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*",
"matchCriteriaId": "282F6DB1-4B0F-424F-B5E4-0827F1E7EE6F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r149-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "0E1B292E-658D-462A-8693-A504322DDC65"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3EB8694-DC56-4E35-9659-B2787F872E08"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r149-v0",
"versionEndExcluding": "r150-v2",
"matchCriteriaId": "B4224616-5752-4C58-8A1F-54866314B8A2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D2A4A4-B81E-4034-863D-900D95166543"
}
]
}
]
}
],
"references": [
{
"url": "https://selinc.com/support/security-notifications/external-reports/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.nozominetworks.com/blog/",
"source": "security@selinc.com"
"source": "security@selinc.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-31557",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T16:15:12.427",
"lastModified": "2023-05-10T17:06:24.873",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-17T18:00:51.400",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "xpdf pdfimages v4.04 was discovered to contain a stack overflow in the component Catalog::readEmbeddedFileTree(Object*). This vulnerability allows attackers to cause a Denial of Service (DoS)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC"
}
]
}
]
}
],
"references": [
{
"url": "https://forum.xpdfreader.com/viewtopic.php?t=42422&sid=acb8ed31bbd74223e3c4d0fb2552c748",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-17T18:00:35.205182+00:00
2023-05-17T20:00:44.199443+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-17T17:56:30.120000+00:00
2023-05-17T19:57:05.427000+00:00
```
### Last Data Feed Release
@ -29,48 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
215534
215542
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `8`
* [CVE-2023-22348](CVE-2023/CVE-2023-223xx/CVE-2023-22348.json) (`2023-05-17T16:15:09.110`)
* [CVE-2023-2765](CVE-2023/CVE-2023-27xx/CVE-2023-2765.json) (`2023-05-17T17:15:17.363`)
* [CVE-2023-2766](CVE-2023/CVE-2023-27xx/CVE-2023-2766.json) (`2023-05-17T17:15:17.443`)
* [CVE-2023-2768](CVE-2023/CVE-2023-27xx/CVE-2023-2768.json) (`2023-05-17T17:15:17.523`)
* [CVE-2023-24805](CVE-2023/CVE-2023-248xx/CVE-2023-24805.json) (`2023-05-17T18:15:09.177`)
* [CVE-2023-26044](CVE-2023/CVE-2023-260xx/CVE-2023-26044.json) (`2023-05-17T18:15:09.247`)
* [CVE-2023-2769](CVE-2023/CVE-2023-27xx/CVE-2023-2769.json) (`2023-05-17T18:15:09.317`)
* [CVE-2023-2770](CVE-2023/CVE-2023-27xx/CVE-2023-2770.json) (`2023-05-17T18:15:09.377`)
* [CVE-2023-31135](CVE-2023/CVE-2023-311xx/CVE-2023-31135.json) (`2023-05-17T18:15:09.437`)
* [CVE-2023-2771](CVE-2023/CVE-2023-27xx/CVE-2023-2771.json) (`2023-05-17T19:15:09.210`)
* [CVE-2023-2772](CVE-2023/CVE-2023-27xx/CVE-2023-2772.json) (`2023-05-17T19:15:09.277`)
* [CVE-2023-2773](CVE-2023/CVE-2023-27xx/CVE-2023-2773.json) (`2023-05-17T19:15:09.340`)
### CVEs modified in the last Commit
Recently modified CVEs: `122`
Recently modified CVEs: `23`
* [CVE-2023-31903](CVE-2023/CVE-2023-319xx/CVE-2023-31903.json) (`2023-05-17T17:00:54.967`)
* [CVE-2023-31904](CVE-2023/CVE-2023-319xx/CVE-2023-31904.json) (`2023-05-17T17:00:54.967`)
* [CVE-2023-31700](CVE-2023/CVE-2023-317xx/CVE-2023-31700.json) (`2023-05-17T17:00:54.967`)
* [CVE-2023-31701](CVE-2023/CVE-2023-317xx/CVE-2023-31701.json) (`2023-05-17T17:00:54.967`)
* [CVE-2023-31722](CVE-2023/CVE-2023-317xx/CVE-2023-31722.json) (`2023-05-17T17:00:54.967`)
* [CVE-2023-31723](CVE-2023/CVE-2023-317xx/CVE-2023-31723.json) (`2023-05-17T17:00:54.967`)
* [CVE-2023-31724](CVE-2023/CVE-2023-317xx/CVE-2023-31724.json) (`2023-05-17T17:00:54.967`)
* [CVE-2023-31725](CVE-2023/CVE-2023-317xx/CVE-2023-31725.json) (`2023-05-17T17:00:54.967`)
* [CVE-2023-1732](CVE-2023/CVE-2023-17xx/CVE-2023-1732.json) (`2023-05-17T17:04:45.347`)
* [CVE-2023-2479](CVE-2023/CVE-2023-24xx/CVE-2023-2479.json) (`2023-05-17T17:05:52.643`)
* [CVE-2023-21968](CVE-2023/CVE-2023-219xx/CVE-2023-21968.json) (`2023-05-17T17:06:35.360`)
* [CVE-2023-28858](CVE-2023/CVE-2023-288xx/CVE-2023-28858.json) (`2023-05-17T17:07:38.017`)
* [CVE-2023-28859](CVE-2023/CVE-2023-288xx/CVE-2023-28859.json) (`2023-05-17T17:08:20.883`)
* [CVE-2023-31166](CVE-2023/CVE-2023-311xx/CVE-2023-31166.json) (`2023-05-17T17:11:11.257`)
* [CVE-2023-31165](CVE-2023/CVE-2023-311xx/CVE-2023-31165.json) (`2023-05-17T17:13:58.847`)
* [CVE-2023-31164](CVE-2023/CVE-2023-311xx/CVE-2023-31164.json) (`2023-05-17T17:14:29.607`)
* [CVE-2023-2745](CVE-2023/CVE-2023-27xx/CVE-2023-2745.json) (`2023-05-17T17:15:17.267`)
* [CVE-2023-2629](CVE-2023/CVE-2023-26xx/CVE-2023-2629.json) (`2023-05-17T17:15:23.327`)
* [CVE-2023-31163](CVE-2023/CVE-2023-311xx/CVE-2023-31163.json) (`2023-05-17T17:23:28.937`)
* [CVE-2023-31158](CVE-2023/CVE-2023-311xx/CVE-2023-31158.json) (`2023-05-17T17:23:52.830`)
* [CVE-2023-31157](CVE-2023/CVE-2023-311xx/CVE-2023-31157.json) (`2023-05-17T17:26:09.377`)
* [CVE-2023-31908](CVE-2023/CVE-2023-319xx/CVE-2023-31908.json) (`2023-05-17T17:47:22.840`)
* [CVE-2023-31156](CVE-2023/CVE-2023-311xx/CVE-2023-31156.json) (`2023-05-17T17:47:55.157`)
* [CVE-2023-31910](CVE-2023/CVE-2023-319xx/CVE-2023-31910.json) (`2023-05-17T17:49:55.873`)
* [CVE-2023-31554](CVE-2023/CVE-2023-315xx/CVE-2023-31554.json) (`2023-05-17T17:56:30.120`)
* [CVE-2022-25147](CVE-2022/CVE-2022-251xx/CVE-2022-25147.json) (`2023-05-17T19:42:25.360`)
* [CVE-2023-31557](CVE-2023/CVE-2023-315xx/CVE-2023-31557.json) (`2023-05-17T18:00:51.400`)
* [CVE-2023-31151](CVE-2023/CVE-2023-311xx/CVE-2023-31151.json) (`2023-05-17T18:02:45.437`)
* [CVE-2023-31148](CVE-2023/CVE-2023-311xx/CVE-2023-31148.json) (`2023-05-17T18:07:50.813`)
* [CVE-2023-20046](CVE-2023/CVE-2023-200xx/CVE-2023-20046.json) (`2023-05-17T18:11:46.627`)
* [CVE-2023-31149](CVE-2023/CVE-2023-311xx/CVE-2023-31149.json) (`2023-05-17T18:16:25.090`)
* [CVE-2023-20098](CVE-2023/CVE-2023-200xx/CVE-2023-20098.json) (`2023-05-17T18:20:40.713`)
* [CVE-2023-29462](CVE-2023/CVE-2023-294xx/CVE-2023-29462.json) (`2023-05-17T18:26:52.220`)
* [CVE-2023-30986](CVE-2023/CVE-2023-309xx/CVE-2023-30986.json) (`2023-05-17T18:37:02.453`)
* [CVE-2023-30899](CVE-2023/CVE-2023-308xx/CVE-2023-30899.json) (`2023-05-17T18:37:32.430`)
* [CVE-2023-30898](CVE-2023/CVE-2023-308xx/CVE-2023-30898.json) (`2023-05-17T18:38:32.060`)
* [CVE-2023-30985](CVE-2023/CVE-2023-309xx/CVE-2023-30985.json) (`2023-05-17T18:38:56.983`)
* [CVE-2023-27562](CVE-2023/CVE-2023-275xx/CVE-2023-27562.json) (`2023-05-17T18:42:50.633`)
* [CVE-2023-27563](CVE-2023/CVE-2023-275xx/CVE-2023-27563.json) (`2023-05-17T18:47:30.687`)
* [CVE-2023-31162](CVE-2023/CVE-2023-311xx/CVE-2023-31162.json) (`2023-05-17T19:04:20.050`)
* [CVE-2023-31161](CVE-2023/CVE-2023-311xx/CVE-2023-31161.json) (`2023-05-17T19:05:14.183`)
* [CVE-2023-27564](CVE-2023/CVE-2023-275xx/CVE-2023-27564.json) (`2023-05-17T19:14:43.370`)
* [CVE-2023-31152](CVE-2023/CVE-2023-311xx/CVE-2023-31152.json) (`2023-05-17T19:33:57.350`)
* [CVE-2023-31150](CVE-2023/CVE-2023-311xx/CVE-2023-31150.json) (`2023-05-17T19:36:26.577`)
* [CVE-2023-0008](CVE-2023/CVE-2023-00xx/CVE-2023-0008.json) (`2023-05-17T19:43:56.483`)
* [CVE-2023-2310](CVE-2023/CVE-2023-23xx/CVE-2023-2310.json) (`2023-05-17T19:47:46.723`)
* [CVE-2023-0007](CVE-2023/CVE-2023-00xx/CVE-2023-0007.json) (`2023-05-17T19:50:00.107`)
* [CVE-2023-2250](CVE-2023/CVE-2023-22xx/CVE-2023-2250.json) (`2023-05-17T19:57:05.427`)
## Download and Usage