From 27bc02319f7ed58ee19ad85dc9d6a73cd3c39f9c Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 2 Aug 2023 16:00:40 +0000 Subject: [PATCH] Auto-Update: 2023-08-02T16:00:36.504265+00:00 --- CVE-2022/CVE-2022-406xx/CVE-2022-40609.json | 59 +++++++ CVE-2022/CVE-2022-464xx/CVE-2022-46484.json | 20 +++ CVE-2022/CVE-2022-464xx/CVE-2022-46485.json | 20 +++ CVE-2023/CVE-2023-20xx/CVE-2023-2068.json | 11 +- CVE-2023/CVE-2023-226xx/CVE-2023-22653.json | 14 +- CVE-2023/CVE-2023-234xx/CVE-2023-23476.json | 59 +++++++ CVE-2023/CVE-2023-240xx/CVE-2023-24018.json | 26 ++- CVE-2023/CVE-2023-240xx/CVE-2023-24019.json | 4 +- CVE-2023/CVE-2023-250xx/CVE-2023-25081.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25082.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25083.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25084.json | 18 +- CVE-2023/CVE-2023-250xx/CVE-2023-25085.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25086.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25087.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25088.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25089.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25090.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25091.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25092.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25093.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25094.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25095.json | 18 +- CVE-2023/CVE-2023-250xx/CVE-2023-25096.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25097.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25098.json | 30 ++-- CVE-2023/CVE-2023-250xx/CVE-2023-25099.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25100.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25101.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25102.json | 18 +- CVE-2023/CVE-2023-251xx/CVE-2023-25103.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25104.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25105.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25106.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25107.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25108.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25109.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25110.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25111.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25112.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25113.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25114.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25115.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25116.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25117.json | 18 +- CVE-2023/CVE-2023-251xx/CVE-2023-25118.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25119.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25120.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25121.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25122.json | 18 +- CVE-2023/CVE-2023-251xx/CVE-2023-25123.json | 30 ++-- CVE-2023/CVE-2023-251xx/CVE-2023-25124.json | 30 ++-- CVE-2023/CVE-2023-263xx/CVE-2023-26316.json | 20 +++ CVE-2023/CVE-2023-263xx/CVE-2023-26317.json | 20 +++ CVE-2023/CVE-2023-26xx/CVE-2023-2601.json | 11 +- CVE-2023/CVE-2023-26xx/CVE-2023-2605.json | 11 +- CVE-2023/CVE-2023-26xx/CVE-2023-2626.json | 186 +++++++++++++++++++- CVE-2023/CVE-2023-273xx/CVE-2023-27390.json | 16 +- CVE-2023/CVE-2023-29xx/CVE-2023-2908.json | 14 +- CVE-2023/CVE-2023-311xx/CVE-2023-31194.json | 24 +-- CVE-2023/CVE-2023-312xx/CVE-2023-31248.json | 66 ++++++- CVE-2023/CVE-2023-314xx/CVE-2023-31484.json | 30 +++- CVE-2023/CVE-2023-31xx/CVE-2023-3139.json | 4 +- CVE-2023/CVE-2023-322xx/CVE-2023-32247.json | 73 +++++++- CVE-2023/CVE-2023-322xx/CVE-2023-32248.json | 73 +++++++- CVE-2023/CVE-2023-322xx/CVE-2023-32252.json | 73 +++++++- CVE-2023/CVE-2023-332xx/CVE-2023-33201.json | 8 +- CVE-2023/CVE-2023-332xx/CVE-2023-33257.json | 20 +++ CVE-2023/CVE-2023-332xx/CVE-2023-33298.json | 10 +- CVE-2023/CVE-2023-333xx/CVE-2023-33383.json | 20 +++ CVE-2023/CVE-2023-339xx/CVE-2023-33951.json | 95 +++++++++- CVE-2023/CVE-2023-33xx/CVE-2023-3338.json | 29 +-- CVE-2023/CVE-2023-33xx/CVE-2023-3355.json | 14 +- CVE-2023/CVE-2023-350xx/CVE-2023-35001.json | 66 ++++++- CVE-2023/CVE-2023-361xx/CVE-2023-36118.json | 10 +- CVE-2023/CVE-2023-366xx/CVE-2023-36664.json | 34 +++- CVE-2023/CVE-2023-368xx/CVE-2023-36806.json | 77 +++++++- CVE-2023/CVE-2023-368xx/CVE-2023-36826.json | 70 +++++++- CVE-2023/CVE-2023-371xx/CVE-2023-37150.json | 12 +- CVE-2023/CVE-2023-371xx/CVE-2023-37151.json | 12 +- CVE-2023/CVE-2023-371xx/CVE-2023-37152.json | 12 +- CVE-2023/CVE-2023-371xx/CVE-2023-37153.json | 12 +- CVE-2023/CVE-2023-376xx/CVE-2023-37677.json | 69 +++++++- CVE-2023/CVE-2023-37xx/CVE-2023-3745.json | 99 ++++++++++- CVE-2023/CVE-2023-37xx/CVE-2023-3748.json | 65 ++++++- CVE-2023/CVE-2023-37xx/CVE-2023-3750.json | 69 +++++++- CVE-2023/CVE-2023-37xx/CVE-2023-3772.json | 99 ++++++++++- CVE-2023/CVE-2023-383xx/CVE-2023-38330.json | 24 +++ CVE-2023/CVE-2023-384xx/CVE-2023-38435.json | 75 +++++++- CVE-2023/CVE-2023-38xx/CVE-2023-3812.json | 106 ++++++++++- README.md | 83 ++++----- 91 files changed, 2627 insertions(+), 657 deletions(-) create mode 100644 CVE-2022/CVE-2022-406xx/CVE-2022-40609.json create mode 100644 CVE-2022/CVE-2022-464xx/CVE-2022-46484.json create mode 100644 CVE-2022/CVE-2022-464xx/CVE-2022-46485.json create mode 100644 CVE-2023/CVE-2023-234xx/CVE-2023-23476.json create mode 100644 CVE-2023/CVE-2023-263xx/CVE-2023-26316.json create mode 100644 CVE-2023/CVE-2023-263xx/CVE-2023-26317.json create mode 100644 CVE-2023/CVE-2023-332xx/CVE-2023-33257.json create mode 100644 CVE-2023/CVE-2023-333xx/CVE-2023-33383.json create mode 100644 CVE-2023/CVE-2023-383xx/CVE-2023-38330.json diff --git a/CVE-2022/CVE-2022-406xx/CVE-2022-40609.json b/CVE-2022/CVE-2022-406xx/CVE-2022-40609.json new file mode 100644 index 00000000000..d0637a9ad29 --- /dev/null +++ b/CVE-2022/CVE-2022-406xx/CVE-2022-40609.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2022-40609", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-08-02T15:15:09.833", + "lastModified": "2023-08-02T15:15:09.833", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM SDK, Java Technology Edition 7.1.5.18 and 8.0.8.0 could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization flaw. By sending specially-crafted data, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 236069." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/236069", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7017032", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-464xx/CVE-2022-46484.json b/CVE-2022/CVE-2022-464xx/CVE-2022-46484.json new file mode 100644 index 00000000000..880a9b01fd1 --- /dev/null +++ b/CVE-2022/CVE-2022-464xx/CVE-2022-46484.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2022-46484", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-02T15:15:09.973", + "lastModified": "2023-08-02T15:15:09.973", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure in password protected surveys in Data Illusion Survey Software Solutions NGSurvey v2.4.28 and below allows attackers to view the password to access and arbitrarily submit surveys." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WodenSec/CVE-2022-46484", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-464xx/CVE-2022-46485.json b/CVE-2022/CVE-2022-464xx/CVE-2022-46485.json new file mode 100644 index 00000000000..e905e9221f1 --- /dev/null +++ b/CVE-2022/CVE-2022-464xx/CVE-2022-46485.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2022-46485", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-02T14:15:10.257", + "lastModified": "2023-08-02T14:15:10.257", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Data Illusion Survey Software Solutions ngSurvey version 2.4.28 and below is vulnerable to Denial of Service if a survey contains a \"Text Field\", \"Comment Field\" or \"Contact Details\"." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WodenSec/CVE-2022-46485", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2068.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2068.json index 53134258630..1b2369d1661 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2068.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2068.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2068", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.477", - "lastModified": "2023-07-25T17:15:11.137", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:42:39.387", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,7 +67,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/173735/WordPress-File-Manager-Advanced-Shortcode-2.3.2-Remote-Code-Execution.html", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://wpscan.com/vulnerability/58f72953-56d2-4d86-a49b-311b5fc58056", diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22653.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22653.json index 6e35a570c29..4916312e1bb 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22653.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22653.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22653", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:11.130", - "lastModified": "2023-07-17T20:15:09.793", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:34:59.683", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,19 +17,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 }, { diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23476.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23476.json new file mode 100644 index 00000000000..7636cb66286 --- /dev/null +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23476.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-23476", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-08-02T15:15:10.050", + "lastModified": "2023-08-02T15:15:10.050", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Robotic Process Automation 21.0.0 through 21.0.7.latest is vulnerable to unauthorized access to data due to insufficient authorization validation on some API routes. IBM X-Force ID: 245425." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/245425", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7017490", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24018.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24018.json index eecee880abf..c85a6d62527 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24018.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24018.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24018", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:11.797", - "lastModified": "2023-07-17T20:15:09.893", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:34:45.953", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,19 +17,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 }, { @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24019.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24019.json index 204f4d34cd2..bf009de5dc1 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24019.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24019.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24019", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:11.867", - "lastModified": "2023-07-17T21:15:09.383", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:34:21.127", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25081.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25081.json index bd2fc02ceae..423a8c54755 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25081.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25081.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25081", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:12.470", - "lastModified": "2023-07-17T20:15:09.973", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:33:46.397", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25082.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25082.json index d329acdc8cc..788ea0aedee 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25082.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25082.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25082", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:12.540", - "lastModified": "2023-07-17T20:15:10.057", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:33:42.693", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25083.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25083.json index bc19d8c2079..6e04dde70f2 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25083.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25083.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25083", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:12.610", - "lastModified": "2023-07-17T20:15:10.130", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:33:38.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25084.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25084.json index 65f243468b4..d4269d95510 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25084.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25084.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25084", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:12.680", - "lastModified": "2023-07-17T20:15:10.210", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:33:33.400", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25085.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25085.json index 4ac9b6ecc16..83307fa179a 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25085.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25085.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25085", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:12.757", - "lastModified": "2023-07-17T20:15:10.287", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:27:26.707", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25086.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25086.json index bd0b715545a..793a77654c2 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25086.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25086.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25086", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:12.827", - "lastModified": "2023-07-17T20:15:10.367", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:29:04.243", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25087.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25087.json index 28cadc1c344..6b4e868695a 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25087.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25087.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25087", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:12.897", - "lastModified": "2023-07-17T20:15:10.450", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:29:00.700", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25088.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25088.json index 4546c9b3375..6ea728d0a10 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25088.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25088.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25088", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:12.967", - "lastModified": "2023-07-17T20:15:10.527", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:57.310", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25089.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25089.json index 6dac409a121..56b0ae8eded 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25089.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25089.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25089", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.043", - "lastModified": "2023-07-17T20:15:10.607", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:53.933", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25090.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25090.json index 165b5a4528b..3ee0684874d 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25090.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25090.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25090", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.117", - "lastModified": "2023-07-17T20:15:10.687", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:49.313", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25091.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25091.json index d8642bf3b1d..babc1cab046 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25091.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25091.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25091", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.187", - "lastModified": "2023-07-17T20:15:10.760", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:44.447", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25092.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25092.json index 38c755d87a6..999226e56d5 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25092.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25092.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25092", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.257", - "lastModified": "2023-07-17T20:15:10.837", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:40.103", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25093.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25093.json index e6d812a1cc3..95df8e09fb0 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25093.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25093.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25093", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.333", - "lastModified": "2023-07-17T20:15:10.917", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:36.770", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25094.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25094.json index 90b6edb2cab..43b0f8e4daa 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25094.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25094.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25094", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.423", - "lastModified": "2023-07-17T20:15:10.987", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:33.493", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25095.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25095.json index a2da10612ca..91ecaec310a 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25095.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25095.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25095", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.493", - "lastModified": "2023-07-17T20:15:11.060", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:30.207", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25096.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25096.json index df7298d9b6d..34a4af5837f 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25096.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25096.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25096", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.563", - "lastModified": "2023-07-17T20:15:11.133", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:24.380", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25097.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25097.json index 6899cdcce4f..caeedb7c382 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25097.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25097.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25097", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.637", - "lastModified": "2023-07-17T20:15:11.213", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:10.500", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25098.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25098.json index f12d4f132d1..ad38ba03a8c 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25098.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25098.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25098", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.707", - "lastModified": "2023-07-17T20:15:11.287", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:05.450", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25099.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25099.json index 0dfc567daf9..17e68c324be 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25099.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25099.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25099", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.783", - "lastModified": "2023-07-17T20:15:11.367", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:01.507", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25100.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25100.json index 6488fc7c850..b61a2183823 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25100.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25100.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25100", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.857", - "lastModified": "2023-07-17T20:15:11.447", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:27:53.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25101.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25101.json index 8ff89cb577b..10b65abfd3c 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25101.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25101.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25101", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.923", - "lastModified": "2023-07-17T20:15:11.520", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:27:57.373", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25102.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25102.json index a2227caec7f..68adb2fb891 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25102.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25102.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25102", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:13.993", - "lastModified": "2023-07-17T20:15:11.593", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:27:46.737", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25103.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25103.json index bb33bd5e695..077f9a641ec 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25103.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25103.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25103", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.060", - "lastModified": "2023-07-17T20:15:11.670", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:27:33.770", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25104.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25104.json index 4daca090332..c1ebb16a5b2 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25104.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25104.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25104", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.127", - "lastModified": "2023-07-17T20:15:11.747", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:27:31.697", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25105.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25105.json index 2cac487d42c..78e11ad8f04 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25105.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25105.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25105", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.197", - "lastModified": "2023-07-17T20:15:11.823", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:22:57.443", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25106.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25106.json index f889e72cbaa..5a1b9fdf045 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25106.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25106.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25106", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.267", - "lastModified": "2023-07-17T20:15:11.907", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:22:52.563", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25107.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25107.json index 0c76cc2439a..264c507fc41 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25107.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25107.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25107", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.340", - "lastModified": "2023-07-17T20:15:11.987", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:22:48.787", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25108.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25108.json index 0c900250e46..a617d933647 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25108.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25108.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25108", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.407", - "lastModified": "2023-07-17T20:15:12.063", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:22:43.817", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25109.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25109.json index 101bf221a63..f03ae301187 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25109.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25109.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25109", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.473", - "lastModified": "2023-07-17T20:15:12.133", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:22:39.190", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25110.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25110.json index 468480b00b1..fb03e882f82 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25110.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25110.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25110", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.543", - "lastModified": "2023-07-17T20:15:12.210", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:22:35.777", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25111.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25111.json index 9b6c1fd286a..e93c26667c5 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25111.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25111.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25111", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.613", - "lastModified": "2023-07-17T20:15:12.290", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:22:29.477", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25112.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25112.json index 8c5bffa438d..ea7b3199863 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25112.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25112.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25112", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.680", - "lastModified": "2023-07-17T20:15:12.363", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:22:25.117", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25113.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25113.json index 385050c5247..b45117eb0a6 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25113.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25113.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25113", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.747", - "lastModified": "2023-07-17T20:15:12.437", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:21:46.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25114.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25114.json index 9e11991be48..588ebd50bfd 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25114.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25114.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25114", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.817", - "lastModified": "2023-07-17T20:15:12.517", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:21:42.860", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25115.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25115.json index 0d117c1efb0..70684f07387 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25115.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25115.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25115", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.887", - "lastModified": "2023-07-17T20:15:12.587", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:21:37.643", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25116.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25116.json index 73f4e8b1792..0a0157cf7dd 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25116.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25116.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25116", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:14.957", - "lastModified": "2023-07-17T20:15:12.667", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:21:33.847", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25117.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25117.json index 1208130dae7..7aa35b1609d 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25117.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25117.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25117", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:15.023", - "lastModified": "2023-07-17T20:15:12.740", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:21:30.070", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25118.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25118.json index 3c45217da4f..2f0c1830157 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25118.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25118.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25118", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:15.097", - "lastModified": "2023-07-17T20:15:12.817", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:21:26.430", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25119.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25119.json index bf456889dcb..c12b376e400 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25119.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25119.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25119", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:15.163", - "lastModified": "2023-07-17T20:15:12.893", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:21:22.560", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25120.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25120.json index be84ede7112..2d891c9ec46 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25120.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25120.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25120", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:15.233", - "lastModified": "2023-07-17T20:15:12.967", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:21:18.587", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25121.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25121.json index 8826b2163e8..af79036cf4d 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25121.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25121.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25121", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:15.307", - "lastModified": "2023-07-17T20:15:13.043", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:21:14.670", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25122.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25122.json index ff3231725d9..c01aceca1bd 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25122.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25122.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25122", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:15.377", - "lastModified": "2023-07-17T20:15:13.120", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:21:10.623", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25123.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25123.json index 4d081a6f17b..59ae24c24f3 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25123.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25123.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25123", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:15.447", - "lastModified": "2023-07-17T20:15:13.193", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:21:04.497", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25124.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25124.json index f984fe0f2c8..9ee5d5c1ad9 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25124.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25124.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25124", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-06T15:15:15.513", - "lastModified": "2023-07-17T20:15:13.267", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:20:32.963", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 7.2, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.2, + "impactScore": 5.9 }, { "source": "talos-cna@cisco.com", @@ -56,8 +56,18 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "talos-cna@cisco.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-263xx/CVE-2023-26316.json b/CVE-2023/CVE-2023-263xx/CVE-2023-26316.json new file mode 100644 index 00000000000..3c17ae668f0 --- /dev/null +++ b/CVE-2023/CVE-2023-263xx/CVE-2023-26316.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-26316", + "sourceIdentifier": "security@xiaomi.com", + "published": "2023-08-02T14:15:10.343", + "lastModified": "2023-08-02T14:15:10.343", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A XSS vulnerability exists in the Xiaomi cloud service Application product. The vulnerability is caused by Webview's whitelist checking function allowing javascript protocol to be loaded and can be exploited by attackers to steal Xiaomi cloud service account's cookies." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=322", + "source": "security@xiaomi.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-263xx/CVE-2023-26317.json b/CVE-2023/CVE-2023-263xx/CVE-2023-26317.json new file mode 100644 index 00000000000..9d030f3f521 --- /dev/null +++ b/CVE-2023/CVE-2023-263xx/CVE-2023-26317.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-26317", + "sourceIdentifier": "security@xiaomi.com", + "published": "2023-08-02T14:15:10.407", + "lastModified": "2023-08-02T14:15:10.407", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been discovered in Xiaomi routers that could allow command injection through an external interface. This vulnerability arises from inadequate filtering of responses returned from the external interface. Attackers could exploit this vulnerability by hijacking the ISP or an upper-layer router to gain privileges on the Xiaomi router. Successful exploitation of this flaw could permit remote code execution and complete compromise of the device." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=529", + "source": "security@xiaomi.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2601.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2601.json index 4b45e6139b5..7bd3a1a495c 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2601.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2601.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2601", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.847", - "lastModified": "2023-07-25T17:15:11.547", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:42:36.313", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/173732/WordPress-WP-Brutal-AI-Cross-Site-Request-Forgery-SQL-Injection.html", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://wpscan.com/vulnerability/57769468-3802-4985-bf5e-44ec1d59f5fd", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2605.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2605.json index 329c80ca521..43d726706a3 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2605.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2605.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2605", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-27T14:15:10.910", - "lastModified": "2023-07-25T17:15:11.710", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:42:33.177", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,7 +67,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/173734/WordPress-WP-Brutal-AI-Cross-Site-Scripting.html", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://wpscan.com/vulnerability/372cb940-71ba-4d19-b35a-ab15f8c2fdeb", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2626.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2626.json index 0d537ae749d..17ba1908af6 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2626.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2626.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2626", "sourceIdentifier": "cve-coordination@google.com", "published": "2023-07-25T18:15:10.690", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T15:48:29.807", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cve-coordination@google.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "cve-coordination@google.com", "type": "Secondary", @@ -46,10 +76,160 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:nest_hub_max_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.20221207.2.109", + "versionEndExcluding": "10.20221207.2.120", + "matchCriteriaId": "AAE38EF3-8D1A-4A25-84AA-3FA7CD3A4430" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:google:nest_hub_max:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39B8859A-A8C1-4687-B092-12DB062328E6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:nest_hub_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.20221207.2.100038", + "versionEndExcluding": "10.20221207.2.100042", + "matchCriteriaId": "0DD08397-FCC3-4A40-9099-D44B3FAA86D9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:google:nest_hub:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAAE3D16-7C2D-4F04-B835-E8840845F6B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:wifi_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14150.881.7", + "versionEndExcluding": "14150.882.9", + "matchCriteriaId": "C8416D0A-D67B-45F9-951E-8B2E8E457E37" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:google:wifi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70A24C3F-07E5-4C50-BA19-8E463FE5B9D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:nest_wifi_point_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.56.1", + "versionEndExcluding": "1.56.368671", + "matchCriteriaId": "5E08A6BD-3811-4944-B701-A09496DD5E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:google:nest_wifi_point:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F09454DF-61F2-4AF0-9C0D-56026C1E0F0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:nest_wifi_6e_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.59", + "versionEndExcluding": "1.63.355999", + "matchCriteriaId": "FA5B6F80-87EA-43FC-9A59-E849212A9964" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:google:nest_wifi_6e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CAFE1936-564C-496A-AAE1-E839DAB1A6A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.google.com/product-documentation/answer/13588832?hl=en&ref_topic=12974021&sjid=7833436865896465963-NA#zippy=%2Cnest-wifi", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27390.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27390.json index 83e751a3005..d6989bd7298 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27390.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27390.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27390", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-05T16:15:09.507", - "lastModified": "2023-07-17T21:15:09.473", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:38:42.047", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,19 +17,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 7.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 1.8, "impactScore": 5.9 }, { diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2908.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2908.json index 465ebd27b16..36317501044 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2908.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2908.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2908", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-30T22:15:10.017", - "lastModified": "2023-08-01T02:15:10.147", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-02T15:41:00.757", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -118,11 +118,17 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230731-0004/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31194.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31194.json index de1d3c7c758..6153ff0abe5 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31194.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31194.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31194", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-05T16:15:09.600", - "lastModified": "2023-07-17T21:15:09.560", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:38:15.457", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,19 +17,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 7.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 1.8, "impactScore": 5.9 }, { @@ -56,22 +56,22 @@ }, "weaknesses": [ { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-129" } ] }, { - "source": "nvd@nist.gov", + "source": "talos-cna@cisco.com", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-787" + "value": "CWE-119" } ] } diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31248.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31248.json index f0b74720809..2bb2e75257d 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31248.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31248.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31248", "sourceIdentifier": "security@ubuntu.com", "published": "2023-07-05T19:15:09.713", - "lastModified": "2023-07-26T17:15:10.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-02T15:37:25.933", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -91,27 +91,72 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + } + ] + } + ] } ], "references": [ { "url": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/07/05/2", "source": "security@ubuntu.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/", + "source": "security@ubuntu.com", "tags": [ "Mailing List" ] }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/", - "source": "security@ubuntu.com" - }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lore.kernel.org/netfilter-devel/20230705121627.GC19489@breakpoint.cc/T/", @@ -122,7 +167,10 @@ }, { "url": "https://www.debian.org/security/2023/dsa-5453", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2023/07/05/2", diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31484.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31484.json index 64422f46b09..33655c72797 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31484.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31484.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31484", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-29T00:15:09.000", - "lastModified": "2023-07-10T16:15:52.337", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:28:49.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -62,6 +62,22 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.38.0", + "matchCriteriaId": "00980675-EC82-443D-AFFE-B83E5239DAB9" + } + ] + } + ] } ], "references": [ @@ -114,11 +130,17 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://metacpan.org/dist/CPAN/changes", diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3139.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3139.json index 92058898dd7..4c5ab0ab5aa 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3139.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3139.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3139", "sourceIdentifier": "contact@wpscan.com", "published": "2023-07-04T08:15:10.517", - "lastModified": "2023-07-24T09:15:10.147", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:39:03.657", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32247.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32247.json index e0e9e9d225b..06fbeac1884 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32247.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32247.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32247", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:11.470", - "lastModified": "2023-07-25T13:01:13.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T14:58:49.340", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,18 +54,61 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.3.9", + "matchCriteriaId": "91F73DF0-B48A-4A70-A0C6-8844D289441D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-32247", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219803", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-20478/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32248.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32248.json index b38169de9fe..faf6be773b9 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32248.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32248.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32248", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:11.543", - "lastModified": "2023-07-25T13:01:13.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T14:12:51.727", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,18 +54,61 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.3.9", + "matchCriteriaId": "91F73DF0-B48A-4A70-A0C6-8844D289441D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-32248", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219818", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-20479/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32252.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32252.json index 9f2a405d2b4..24b6ea62911 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32252.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32252.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32252", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:11.610", - "lastModified": "2023-07-25T13:01:13.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T15:08:52.403", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,18 +54,61 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.3.9", + "matchCriteriaId": "91F73DF0-B48A-4A70-A0C6-8844D289441D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-32252", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219815", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-20590/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33201.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33201.json index a3a06a060d3..a1eb724265d 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33201.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33201.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33201", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-05T03:15:09.197", - "lastModified": "2023-07-10T18:03:45.390", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-02T14:15:10.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -85,6 +85,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00000.html", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33257.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33257.json new file mode 100644 index 00000000000..ae7a86ab5a3 --- /dev/null +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33257.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33257", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-02T14:15:10.570", + "lastModified": "2023-08-02T14:15:10.570", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Verint Engagement Management 15.3 Update 2023R2 is vulnerable to HTML injection via the user data form in the live chat." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://writeup.recoil.nl/verint/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33298.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33298.json index df28915123c..43bea7d7495 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33298.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33298.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33298", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-30T22:15:10.077", - "lastModified": "2023-07-20T20:15:10.310", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:40:35.783", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -73,7 +73,11 @@ }, { "url": "https://www.kb.cert.org/vuls/id/653767", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://www.ns-echo.com/posts/cve_2023_33298.html", diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33383.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33383.json new file mode 100644 index 00000000000..ea09776841b --- /dev/null +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33383.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33383", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-02T14:15:10.637", + "lastModified": "2023-08-02T14:15:10.637", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Shelly 4PM Pro four-channel smart switch 0.11.0 allows an attacker to trigger a BLE out of bounds read fault condition that results in a device reload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.exploitsecurity.io/post/cve-2023-33383-authentication-bypass-via-an-out-of-bounds-read-vulnerability", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33951.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33951.json index e767c42471e..d7dae7edd21 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33951.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33951.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33951", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:11.820", - "lastModified": "2023-07-25T13:01:13.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T15:12:16.797", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.0 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,18 +54,83 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.3.9", + "matchCriteriaId": "91F73DF0-B48A-4A70-A0C6-8844D289441D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-33951", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218195", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3338.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3338.json index 235487efc4e..44780ed3f97 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3338.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3338.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3338", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-30T22:15:10.270", - "lastModified": "2023-07-27T21:15:14.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-02T15:40:05.347", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,19 +17,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "baseScore": 6.5, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 3.6 }, { @@ -86,15 +86,24 @@ "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-3338", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218618", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://seclists.org/oss-sec/2023/q2/276", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3355.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3355.json index 353ecbec887..eb64818364e 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3355.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3355.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3355", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-28T21:15:10.383", - "lastModified": "2023-07-24T16:15:12.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-02T15:42:23.470", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -127,11 +127,17 @@ "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-3355", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217820", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d839f0811a31322c087a859c2b181e2383daa7be", diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35001.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35001.json index d02127b0ec8..17fc2d97db3 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35001.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35001.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35001", "sourceIdentifier": "security@ubuntu.com", "published": "2023-07-05T19:15:10.147", - "lastModified": "2023-07-26T17:15:10.780", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-08-02T15:35:32.843", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -91,27 +91,72 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] } ], "references": [ { "url": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/07/05/3", "source": "security@ubuntu.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/", + "source": "security@ubuntu.com", "tags": [ "Mailing List" ] }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/", - "source": "security@ubuntu.com" - }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lore.kernel.org/netfilter-devel/20230705121515.747251-1-cascardo@canonical.com/T/", @@ -123,7 +168,10 @@ }, { "url": "https://www.debian.org/security/2023/dsa-5453", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2023/07/05/3", diff --git a/CVE-2023/CVE-2023-361xx/CVE-2023-36118.json b/CVE-2023/CVE-2023-361xx/CVE-2023-36118.json index 3009328944d..1e7a0239334 100644 --- a/CVE-2023/CVE-2023-361xx/CVE-2023-36118.json +++ b/CVE-2023/CVE-2023-361xx/CVE-2023-36118.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36118", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-01T23:15:30.217", - "lastModified": "2023-08-02T13:30:39.550", + "lastModified": "2023-08-02T15:15:10.183", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -23,6 +23,14 @@ { "url": "https://hackmd.io/@SY-T/Hy6HvwxPn", "source": "cve@mitre.org" + }, + { + "url": "https://www.chtsecurity.com/news/4ffbe017-70e1-4789-bfe6-4d6fb0d1a0b7", + "source": "cve@mitre.org" + }, + { + "url": "https://www.chtsecurity.com/news/5282e0af-7c45-43b0-9869-9becee7d6d70", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36664.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36664.json index 3d0906a63f0..8a8a7eeb754 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36664.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36664.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36664", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-25T22:15:21.463", - "lastModified": "2023-07-23T03:15:09.737", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T15:42:44.443", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -82,6 +82,26 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] } ], "references": [ @@ -111,11 +131,17 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ICXN5VPF3WJCYKMPSYER5KHTPJXSTJZ/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EWMEK2UPCUU3ZLL7VASE5CEHDQY4VKV/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5446", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36806.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36806.json index 1f9c7d15ea9..99e73998b6e 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36806.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36806.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36806", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-25T19:15:11.550", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T15:59:40.037", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,22 +66,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.9.42", + "matchCriteriaId": "15E0A7C9-3A78-4D4B-8871-FD3299C55F06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10.0", + "versionEndExcluding": "4.13.28", + "matchCriteriaId": "D5DDD8AD-0906-478A-BAB4-5B0B4C50C517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.1.10", + "matchCriteriaId": "11B3001D-C6B9-44C3-B477-ECD0C4BD3397" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/contao/contao/commit/5c9aff32cfc1f7dc452a045862ac2f86a6b9b4b4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/contao/contao/commit/c98585d36baa25fda69c062421e7e7eadc53c82b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/contao/contao/commit/ccb64c777eb0f9c0e6490c9135d80e915d37cd32", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/contao/contao/security/advisories/GHSA-4gpr-p634-922x", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36826.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36826.json index f05a7605a3d..4ffeda84ba9 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36826.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36826.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36826", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-25T19:15:11.640", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T15:57:30.653", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,18 +80,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.21.0", + "versionEndExcluding": "23.5.2", + "matchCriteriaId": "3BFE13DE-CDC1-443A-BA64-4F8B52C3C02E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/getsentry/sentry/pull/49680", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-371xx/CVE-2023-37150.json b/CVE-2023/CVE-2023-371xx/CVE-2023-37150.json index f6b0cc0ad5b..06194295d07 100644 --- a/CVE-2023/CVE-2023-371xx/CVE-2023-37150.json +++ b/CVE-2023/CVE-2023-371xx/CVE-2023-37150.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37150", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-10T16:15:53.467", - "lastModified": "2023-07-13T18:41:51.503", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-02T15:15:10.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -70,6 +70,14 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://www.chtsecurity.com/news/57fd2fe6-11d9-421d-9087-88b4d5090452", + "source": "cve@mitre.org" + }, + { + "url": "https://www.chtsecurity.com/news/c27389f3-a70b-4a71-952a-49f273d1db90", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-371xx/CVE-2023-37151.json b/CVE-2023/CVE-2023-371xx/CVE-2023-37151.json index 1feae25a028..4e3570a8e8a 100644 --- a/CVE-2023/CVE-2023-371xx/CVE-2023-37151.json +++ b/CVE-2023/CVE-2023-371xx/CVE-2023-37151.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37151", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-10T16:15:53.513", - "lastModified": "2023-07-13T18:41:31.553", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-02T15:15:10.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,14 @@ "Third Party Advisory" ] }, + { + "url": "https://www.chtsecurity.com/news/50227a91-34ee-4b2d-9c84-954860488202", + "source": "cve@mitre.org" + }, + { + "url": "https://www.chtsecurity.com/news/8b7ace7d-c5b0-42a9-99b6-8fd0814ed7be", + "source": "cve@mitre.org" + }, { "url": "https://www.exploit-db.com/exploits/51431", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-371xx/CVE-2023-37152.json b/CVE-2023/CVE-2023-371xx/CVE-2023-37152.json index 5c2630e8a8b..c1115650b59 100644 --- a/CVE-2023/CVE-2023-371xx/CVE-2023-37152.json +++ b/CVE-2023/CVE-2023-371xx/CVE-2023-37152.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37152", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-10T16:15:53.563", - "lastModified": "2023-07-18T15:11:01.287", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-02T15:15:10.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,14 @@ "Third Party Advisory" ] }, + { + "url": "https://www.chtsecurity.com/news/ad3cee07-3e35-45c0-97f9-811cce13dda9", + "source": "cve@mitre.org" + }, + { + "url": "https://www.chtsecurity.com/news/afe25fb4-55ac-45d9-9ece-cbc1edda2fb2%20", + "source": "cve@mitre.org" + }, { "url": "https://www.exploit-db.com/exploits/51524", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-371xx/CVE-2023-37153.json b/CVE-2023/CVE-2023-371xx/CVE-2023-37153.json index ad2a38c4aa3..dea1780b289 100644 --- a/CVE-2023/CVE-2023-371xx/CVE-2023-37153.json +++ b/CVE-2023/CVE-2023-371xx/CVE-2023-37153.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37153", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-10T16:15:53.610", - "lastModified": "2023-07-18T13:09:10.123", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-02T15:15:10.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -78,6 +78,14 @@ "tags": [ "Product" ] + }, + { + "url": "https://www.chtsecurity.com/news/13a86b33-7e49-4167-9682-7ff3f51cbcba%20", + "source": "cve@mitre.org" + }, + { + "url": "https://www.chtsecurity.com/news/55f0a781-f7bf-4b2f-b2cc-7957fdf846da", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-376xx/CVE-2023-37677.json b/CVE-2023/CVE-2023-376xx/CVE-2023-37677.json index 25c44bd1773..b90095c8bb6 100644 --- a/CVE-2023/CVE-2023-376xx/CVE-2023-37677.json +++ b/CVE-2023/CVE-2023-376xx/CVE-2023-37677.json @@ -2,19 +2,80 @@ "id": "CVE-2023-37677", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-25T20:15:13.823", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T15:50:30.497", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Pligg CMS v2.0.2 (also known as Kliqqi) was discovered to contain a remote code execution (RCE) vulnerability in the component admin_editor.php." + }, + { + "lang": "es", + "value": "Se ha descubierto una vulnerabilidad en Pligg CMS v2.0.2 (tambi\u00e9n conocido como Kliqqi) que permite la ejecuci\u00f3n de c\u00f3digo remoto en el componente \"admin_editor.php\". " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/264", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3745.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3745.json index 5ef971e30ee..d67bbd9e9d4 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3745.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3745.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3745", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:13.130", - "lastModified": "2023-07-25T13:01:09.337", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T14:08:06.510", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,34 +54,95 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.9-11-0", + "matchCriteriaId": "BA9905B3-D649-46D9-9F93-BD74D9964B61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0-0", + "versionEndExcluding": "7.0.10-0", + "matchCriteriaId": "1193CD0F-45E9-4341-A2CF-4C5DEE257B2C" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-3745", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223557", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/ImageMagick/ImageMagick/commit/54cdc146bbe50018526770be201b56643ad58ba7", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ImageMagick/ImageMagick/commit/651672f19c75161a6159d9b6838fd3095b6c5304", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ImageMagick/ImageMagick/issues/1857", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/ImageMagick/ImageMagick6/commit/7486477aa00c5c7856b111506da075b6cdfa8b73", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ImageMagick/ImageMagick6/commit/b466a96965afc1308a4ace93f5535c2b770f294b", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3748.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3748.json index b6fb6ef978f..33c514a7e38 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3748.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3748.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3748", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:13.203", - "lastModified": "2023-07-25T13:01:09.337", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T14:46:07.263", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,14 +54,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.5", + "matchCriteriaId": "AB0E7F12-AAE7-48DA-B684-585BA3188B28" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-3748", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223668", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3750.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3750.json index c29aefd684e..c61b87b9c38 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3750.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3750.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3750", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:13.267", - "lastModified": "2023-07-25T13:01:09.337", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T14:54:04.933", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,14 +54,55 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FED07429-2F89-4903-99EF-C153CD0FC59E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-3750", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222210", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3772.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3772.json index d855188aeab..8a735860bbc 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3772.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3772.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3772", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-25T16:15:11.660", - "lastModified": "2023-07-25T17:22:14.780", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T15:33:46.097", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,14 +54,85 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3FEADDA-2AEE-4F65-9401-971B585664A8" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-3772", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218943", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38330.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38330.json new file mode 100644 index 00000000000..916f04b77cc --- /dev/null +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38330.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-38330", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-02T15:15:10.813", + "lastModified": "2023-08-02T15:15:10.813", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "OXID eShop Enterprise Edition 6.5.0 \u2013 6.5.2 before 6.5.3 allows uploading files with modified headers in the administration area. An attacker can upload a file with a modified header to create a HTTP Response Splitting attack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugs.oxid-esales.com/view.php?id=7479", + "source": "cve@mitre.org" + }, + { + "url": "https://docs.oxid-esales.com/de/security/security-bulletins.html#security-bulletin-2023-002", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38435.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38435.json index 9982cf678f1..3f7ce68a428 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38435.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38435.json @@ -2,18 +2,41 @@ "id": "CVE-2023-38435", "sourceIdentifier": "security@apache.org", "published": "2023-07-25T16:15:11.500", - "lastModified": "2023-07-26T07:15:10.323", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T15:11:25.040", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\nAn improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Apache Felix Healthcheck Webconsole Plugin version 2.0.2 and prior may allow an attacker to perform a reflected cross-site scripting (XSS) attack.\n\nUpgrade to Apache Felix Healthcheck Webconsole Plugin 2.1.0 or higher." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -21,20 +44,58 @@ "value": "CWE-79" } ] + }, + { + "source": "security@apache.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:felix_health_checks:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.0.2", + "matchCriteriaId": "5AD42A62-B2BB-4A4A-8C29-F897B3C32274" + } + ] + } + ] } ], "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Jul/43", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/07/25/10", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/r3blhp3onr4rdbkgdyglqnccg0v79pfv", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3812.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3812.json index ca6a68a7422..0a97d857d8f 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3812.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3812.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3812", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:13.337", - "lastModified": "2023-07-25T13:01:09.337", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T15:09:10.930", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,18 +54,94 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.0.19", + "matchCriteriaId": "D6F6A68F-EDF4-4E31-953F-740FCFBE5234" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-3812", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224048", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 8b0b7acc5f7..8cba60ae8bc 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-02T14:00:30.202045+00:00 +2023-08-02T16:00:36.504265+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-02T13:56:49.707000+00:00 +2023-08-02T15:59:40.037000+00:00 ``` ### Last Data Feed Release @@ -29,58 +29,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -221459 +221468 ``` ### CVEs added in the last Commit -Recently added CVEs: `14` +Recently added CVEs: `9` -* [CVE-2023-26430](CVE-2023/CVE-2023-264xx/CVE-2023-26430.json) (`2023-08-02T13:15:10.217`) -* [CVE-2023-26438](CVE-2023/CVE-2023-264xx/CVE-2023-26438.json) (`2023-08-02T13:15:10.323`) -* [CVE-2023-26439](CVE-2023/CVE-2023-264xx/CVE-2023-26439.json) (`2023-08-02T13:15:10.403`) -* [CVE-2023-26440](CVE-2023/CVE-2023-264xx/CVE-2023-26440.json) (`2023-08-02T13:15:10.483`) -* [CVE-2023-26441](CVE-2023/CVE-2023-264xx/CVE-2023-26441.json) (`2023-08-02T13:15:10.563`) -* [CVE-2023-26442](CVE-2023/CVE-2023-264xx/CVE-2023-26442.json) (`2023-08-02T13:15:10.640`) -* [CVE-2023-26443](CVE-2023/CVE-2023-264xx/CVE-2023-26443.json) (`2023-08-02T13:15:10.720`) -* [CVE-2023-26445](CVE-2023/CVE-2023-264xx/CVE-2023-26445.json) (`2023-08-02T13:15:10.797`) -* [CVE-2023-26446](CVE-2023/CVE-2023-264xx/CVE-2023-26446.json) (`2023-08-02T13:15:10.877`) -* [CVE-2023-26447](CVE-2023/CVE-2023-264xx/CVE-2023-26447.json) (`2023-08-02T13:15:10.947`) -* [CVE-2023-26448](CVE-2023/CVE-2023-264xx/CVE-2023-26448.json) (`2023-08-02T13:15:11.017`) -* [CVE-2023-26449](CVE-2023/CVE-2023-264xx/CVE-2023-26449.json) (`2023-08-02T13:15:11.090`) -* [CVE-2023-26450](CVE-2023/CVE-2023-264xx/CVE-2023-26450.json) (`2023-08-02T13:15:11.160`) -* [CVE-2023-26451](CVE-2023/CVE-2023-264xx/CVE-2023-26451.json) (`2023-08-02T13:15:11.233`) +* [CVE-2022-46485](CVE-2022/CVE-2022-464xx/CVE-2022-46485.json) (`2023-08-02T14:15:10.257`) +* [CVE-2022-40609](CVE-2022/CVE-2022-406xx/CVE-2022-40609.json) (`2023-08-02T15:15:09.833`) +* [CVE-2022-46484](CVE-2022/CVE-2022-464xx/CVE-2022-46484.json) (`2023-08-02T15:15:09.973`) +* [CVE-2023-26316](CVE-2023/CVE-2023-263xx/CVE-2023-26316.json) (`2023-08-02T14:15:10.343`) +* [CVE-2023-26317](CVE-2023/CVE-2023-263xx/CVE-2023-26317.json) (`2023-08-02T14:15:10.407`) +* [CVE-2023-33257](CVE-2023/CVE-2023-332xx/CVE-2023-33257.json) (`2023-08-02T14:15:10.570`) +* [CVE-2023-33383](CVE-2023/CVE-2023-333xx/CVE-2023-33383.json) (`2023-08-02T14:15:10.637`) +* [CVE-2023-23476](CVE-2023/CVE-2023-234xx/CVE-2023-23476.json) (`2023-08-02T15:15:10.050`) +* [CVE-2023-38330](CVE-2023/CVE-2023-383xx/CVE-2023-38330.json) (`2023-08-02T15:15:10.813`) ### CVEs modified in the last Commit -Recently modified CVEs: `72` +Recently modified CVEs: `81` -* [CVE-2023-3732](CVE-2023/CVE-2023-37xx/CVE-2023-3732.json) (`2023-08-02T13:30:39.550`) -* [CVE-2023-3733](CVE-2023/CVE-2023-37xx/CVE-2023-3733.json) (`2023-08-02T13:30:39.550`) -* [CVE-2023-3734](CVE-2023/CVE-2023-37xx/CVE-2023-3734.json) (`2023-08-02T13:30:39.550`) -* [CVE-2023-3735](CVE-2023/CVE-2023-37xx/CVE-2023-3735.json) (`2023-08-02T13:30:39.550`) -* [CVE-2023-3736](CVE-2023/CVE-2023-37xx/CVE-2023-3736.json) (`2023-08-02T13:30:39.550`) -* [CVE-2023-3737](CVE-2023/CVE-2023-37xx/CVE-2023-3737.json) (`2023-08-02T13:30:39.550`) -* [CVE-2023-3738](CVE-2023/CVE-2023-37xx/CVE-2023-3738.json) (`2023-08-02T13:30:39.550`) -* [CVE-2023-3739](CVE-2023/CVE-2023-37xx/CVE-2023-3739.json) (`2023-08-02T13:30:39.550`) -* [CVE-2023-3740](CVE-2023/CVE-2023-37xx/CVE-2023-3740.json) (`2023-08-02T13:30:39.550`) -* [CVE-2023-0632](CVE-2023/CVE-2023-06xx/CVE-2023-0632.json) (`2023-08-02T13:30:39.550`) -* [CVE-2023-20583](CVE-2023/CVE-2023-205xx/CVE-2023-20583.json) (`2023-08-02T13:30:45.017`) -* [CVE-2023-3718](CVE-2023/CVE-2023-37xx/CVE-2023-3718.json) (`2023-08-02T13:30:45.017`) -* [CVE-2023-31425](CVE-2023/CVE-2023-314xx/CVE-2023-31425.json) (`2023-08-02T13:30:45.017`) -* [CVE-2023-31429](CVE-2023/CVE-2023-314xx/CVE-2023-31429.json) (`2023-08-02T13:30:45.017`) -* [CVE-2023-31426](CVE-2023/CVE-2023-314xx/CVE-2023-31426.json) (`2023-08-02T13:30:45.017`) -* [CVE-2023-31427](CVE-2023/CVE-2023-314xx/CVE-2023-31427.json) (`2023-08-02T13:30:45.017`) -* [CVE-2023-33560](CVE-2023/CVE-2023-335xx/CVE-2023-33560.json) (`2023-08-02T13:30:45.017`) -* [CVE-2023-33561](CVE-2023/CVE-2023-335xx/CVE-2023-33561.json) (`2023-08-02T13:30:45.017`) -* [CVE-2023-33562](CVE-2023/CVE-2023-335xx/CVE-2023-33562.json) (`2023-08-02T13:30:45.017`) -* [CVE-2023-33563](CVE-2023/CVE-2023-335xx/CVE-2023-33563.json) (`2023-08-02T13:30:45.017`) -* [CVE-2023-33564](CVE-2023/CVE-2023-335xx/CVE-2023-33564.json) (`2023-08-02T13:30:45.017`) -* [CVE-2023-3640](CVE-2023/CVE-2023-36xx/CVE-2023-3640.json) (`2023-08-02T13:49:02.123`) -* [CVE-2023-33952](CVE-2023/CVE-2023-339xx/CVE-2023-33952.json) (`2023-08-02T13:51:38.627`) -* [CVE-2023-32257](CVE-2023/CVE-2023-322xx/CVE-2023-32257.json) (`2023-08-02T13:54:18.810`) -* [CVE-2023-32258](CVE-2023/CVE-2023-322xx/CVE-2023-32258.json) (`2023-08-02T13:56:49.707`) +* [CVE-2023-25084](CVE-2023/CVE-2023-250xx/CVE-2023-25084.json) (`2023-08-02T15:33:33.400`) +* [CVE-2023-25083](CVE-2023/CVE-2023-250xx/CVE-2023-25083.json) (`2023-08-02T15:33:38.147`) +* [CVE-2023-25082](CVE-2023/CVE-2023-250xx/CVE-2023-25082.json) (`2023-08-02T15:33:42.693`) +* [CVE-2023-3772](CVE-2023/CVE-2023-37xx/CVE-2023-3772.json) (`2023-08-02T15:33:46.097`) +* [CVE-2023-25081](CVE-2023/CVE-2023-250xx/CVE-2023-25081.json) (`2023-08-02T15:33:46.397`) +* [CVE-2023-24019](CVE-2023/CVE-2023-240xx/CVE-2023-24019.json) (`2023-08-02T15:34:21.127`) +* [CVE-2023-24018](CVE-2023/CVE-2023-240xx/CVE-2023-24018.json) (`2023-08-02T15:34:45.953`) +* [CVE-2023-22653](CVE-2023/CVE-2023-226xx/CVE-2023-22653.json) (`2023-08-02T15:34:59.683`) +* [CVE-2023-35001](CVE-2023/CVE-2023-350xx/CVE-2023-35001.json) (`2023-08-02T15:35:32.843`) +* [CVE-2023-31248](CVE-2023/CVE-2023-312xx/CVE-2023-31248.json) (`2023-08-02T15:37:25.933`) +* [CVE-2023-31194](CVE-2023/CVE-2023-311xx/CVE-2023-31194.json) (`2023-08-02T15:38:15.457`) +* [CVE-2023-27390](CVE-2023/CVE-2023-273xx/CVE-2023-27390.json) (`2023-08-02T15:38:42.047`) +* [CVE-2023-3139](CVE-2023/CVE-2023-31xx/CVE-2023-3139.json) (`2023-08-02T15:39:03.657`) +* [CVE-2023-3338](CVE-2023/CVE-2023-33xx/CVE-2023-3338.json) (`2023-08-02T15:40:05.347`) +* [CVE-2023-33298](CVE-2023/CVE-2023-332xx/CVE-2023-33298.json) (`2023-08-02T15:40:35.783`) +* [CVE-2023-2908](CVE-2023/CVE-2023-29xx/CVE-2023-2908.json) (`2023-08-02T15:41:00.757`) +* [CVE-2023-3355](CVE-2023/CVE-2023-33xx/CVE-2023-3355.json) (`2023-08-02T15:42:23.470`) +* [CVE-2023-2605](CVE-2023/CVE-2023-26xx/CVE-2023-2605.json) (`2023-08-02T15:42:33.177`) +* [CVE-2023-2601](CVE-2023/CVE-2023-26xx/CVE-2023-2601.json) (`2023-08-02T15:42:36.313`) +* [CVE-2023-2068](CVE-2023/CVE-2023-20xx/CVE-2023-2068.json) (`2023-08-02T15:42:39.387`) +* [CVE-2023-36664](CVE-2023/CVE-2023-366xx/CVE-2023-36664.json) (`2023-08-02T15:42:44.443`) +* [CVE-2023-2626](CVE-2023/CVE-2023-26xx/CVE-2023-2626.json) (`2023-08-02T15:48:29.807`) +* [CVE-2023-37677](CVE-2023/CVE-2023-376xx/CVE-2023-37677.json) (`2023-08-02T15:50:30.497`) +* [CVE-2023-36826](CVE-2023/CVE-2023-368xx/CVE-2023-36826.json) (`2023-08-02T15:57:30.653`) +* [CVE-2023-36806](CVE-2023/CVE-2023-368xx/CVE-2023-36806.json) (`2023-08-02T15:59:40.037`) ## Download and Usage