diff --git a/CVE-2010/CVE-2010-16xx/CVE-2010-1623.json b/CVE-2010/CVE-2010-16xx/CVE-2010-1623.json index fb9f16458c0..561afd5bf79 100644 --- a/CVE-2010/CVE-2010-16xx/CVE-2010-1623.json +++ b/CVE-2010/CVE-2010-16xx/CVE-2010-1623.json @@ -2,8 +2,8 @@ "id": "CVE-2010-1623", "sourceIdentifier": "secalert@redhat.com", "published": "2010-10-04T21:00:03.627", - "lastModified": "2023-02-13T04:17:52.287", - "vulnStatus": "Modified", + "lastModified": "2023-10-03T15:39:37.707", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -279,36 +279,143 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.35", + "versionEndExcluding": "2.0.64", + "matchCriteriaId": "838655CB-43E7-4BDA-A80C-2314C9870717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.2.0", + "versionEndExcluding": "2.2.17", + "matchCriteriaId": "91F58140-8FBA-4733-9E2B-493BC9E5B284" + } + ] + } + ] } ], "references": [ { "url": "http://blogs.sun.com/security/entry/cve_2010_1623_memory_leak", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049885.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049939.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=130168502603566&w=2", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/41701", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/42015", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/42361", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/42367", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/42403", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/42537", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/43211", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/43285", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://security-tracker.debian.org/tracker/CVE-2010-1623", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.627828", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://svn.apache.org/viewvc?view=revision&revision=1003492", @@ -347,19 +454,31 @@ }, { "url": "http://ubuntu.com/usn/usn-1021-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31601", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:192", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0950.html", @@ -384,11 +503,18 @@ }, { "url": "http://www.securityfocus.com/bid/43673", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-1022-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2010/2556", @@ -442,95 +568,187 @@ }, { "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12800", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2013/CVE-2013-13xx/CVE-2013-1315.json b/CVE-2013/CVE-2013-13xx/CVE-2013-1315.json index c5c278ef5fe..9496d6e829c 100644 --- a/CVE-2013/CVE-2013-13xx/CVE-2013-1315.json +++ b/CVE-2013/CVE-2013-13xx/CVE-2013-1315.json @@ -2,8 +2,8 @@ "id": "CVE-2013-1315", "sourceIdentifier": "secure@microsoft.com", "published": "2013-09-11T14:03:48.027", - "lastModified": "2018-10-12T22:04:12.347", - "vulnStatus": "Modified", + "lastModified": "2023-10-03T15:37:36.293", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,6 +85,11 @@ "criteria": "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:x86:*:*", "matchCriteriaId": "3C4CFF7E-7170-4A6B-9A59-9815EE896C62" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:*:*:*", + "matchCriteriaId": "0390EFCA-87B4-42D6-817A-603765F49816" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:*:x64:*", @@ -95,11 +100,6 @@ "criteria": "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:x86:*:*", "matchCriteriaId": "78F27907-6FAB-4A9D-B100-B3D170520A74" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2013_rt:-:*:*:*:*:*:*:*", - "matchCriteriaId": "49CC44C2-53E5-42FD-8B36-1C578BA77EA0" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*", @@ -200,28 +200,46 @@ "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A", "source": "secure@microsoft.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-067", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-073", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18333", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18543", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18950", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-85xx/CVE-2014-8587.json b/CVE-2014/CVE-2014-85xx/CVE-2014-8587.json index 3999a89ec95..2d54bc01a39 100644 --- a/CVE-2014/CVE-2014-85xx/CVE-2014-8587.json +++ b/CVE-2014/CVE-2014-85xx/CVE-2014-8587.json @@ -2,7 +2,7 @@ "id": "CVE-2014-8587", "sourceIdentifier": "cve@mitre.org", "published": "2014-11-04T15:55:07.310", - "lastModified": "2015-02-04T05:08:33.067", + "lastModified": "2023-10-03T15:48:10.677", "vulnStatus": "Analyzed", "descriptions": [ { @@ -69,9 +69,9 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:sap:sapcrytolib:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:sap:sapcryptolib:*:*:*:*:*:*:*:*", "versionEndIncluding": "5.555.37", - "matchCriteriaId": "CB8E2348-7B4E-4116-BDBC-465AD04BA18C" + "matchCriteriaId": "1950C115-4304-4A2A-86CD-EC17DACFC313" }, { "vulnerable": true, @@ -102,15 +102,31 @@ "references": [ { "url": "http://blog.onapsis.com/sap-security-note-2067859-potential-exposure-to-digital-signature-spoofing/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/57606", + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "http://service.sap.com/sap/support/notes/2067859", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://twitter.com/SAP_Gsupport/status/522401681997570048", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-00xx/CVE-2015-0063.json b/CVE-2015/CVE-2015-00xx/CVE-2015-0063.json index 4ac9f1e3ec7..5d32b3e89ad 100644 --- a/CVE-2015/CVE-2015-00xx/CVE-2015-0063.json +++ b/CVE-2015/CVE-2015-00xx/CVE-2015-0063.json @@ -2,8 +2,8 @@ "id": "CVE-2015-0063", "sourceIdentifier": "secure@microsoft.com", "published": "2015-02-11T03:01:06.433", - "lastModified": "2018-10-12T22:08:14.087", - "vulnStatus": "Modified", + "lastModified": "2023-10-03T15:36:12.207", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -114,11 +114,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel:2013:sp3:*:*:*:*:*:*", "matchCriteriaId": "928192DB-8C38-49BE-83E6-E2C601653E2D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2013_rt:-:*:*:*:*:*:*:*", - "matchCriteriaId": "49CC44C2-53E5-42FD-8B36-1C578BA77EA0" } ] } @@ -148,23 +143,41 @@ "references": [ { "url": "http://secunia.com/advisories/62808", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/72460", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "http://www.securitytracker.com/id/1031720", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-012", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100439", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-118xx/CVE-2017-11877.json b/CVE-2017/CVE-2017-118xx/CVE-2017-11877.json index c1eb4450604..f2fb9248869 100644 --- a/CVE-2017/CVE-2017-118xx/CVE-2017-11877.json +++ b/CVE-2017/CVE-2017-118xx/CVE-2017-11877.json @@ -2,7 +2,7 @@ "id": "CVE-2017-11877", "sourceIdentifier": "secure@microsoft.com", "published": "2017-11-15T03:29:01.763", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-10-03T15:38:08.390", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -82,6 +82,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2007:*:*:*:*:*:*:*", + "matchCriteriaId": "5A70D659-F648-4870-852A-4E86D1F4B646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2010:*:*:*:*:*:*:*", + "matchCriteriaId": "98BF87B2-CE8F-4977-9436-9BE5821CF1B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:*:*:*", + "matchCriteriaId": "0390EFCA-87B4-42D6-817A-603765F49816" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", @@ -97,21 +112,6 @@ "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:mac_os_x:*:*", "matchCriteriaId": "DAD067D0-3EE7-4E65-98FF-95277E98DE85" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2007:-:sp3:*:*:*:*:*:*", - "matchCriteriaId": "854B70F5-EFFC-4352-B7A2-6704E77984AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2010:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "99403426-785A-421E-9814-F3DA39B6C00A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2013_rt:-:sp1:*:*:*:*:*:*", - "matchCriteriaId": "73C23D80-56F9-4453-8912-787DBF1A92B3" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel_viewer:2007:sp3:*:*:*:*:*:*", diff --git a/CVE-2017/CVE-2017-118xx/CVE-2017-11878.json b/CVE-2017/CVE-2017-118xx/CVE-2017-11878.json index 0b7fb12863a..b428228e1d9 100644 --- a/CVE-2017/CVE-2017-118xx/CVE-2017-11878.json +++ b/CVE-2017/CVE-2017-118xx/CVE-2017-11878.json @@ -2,7 +2,7 @@ "id": "CVE-2017-11878", "sourceIdentifier": "secure@microsoft.com", "published": "2017-11-15T03:29:01.797", - "lastModified": "2017-11-30T19:20:45.123", + "lastModified": "2023-10-03T15:38:19.230", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -82,6 +82,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2007:*:*:*:*:*:*:*", + "matchCriteriaId": "5A70D659-F648-4870-852A-4E86D1F4B646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2010:*:*:*:*:*:*:*", + "matchCriteriaId": "98BF87B2-CE8F-4977-9436-9BE5821CF1B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:*:*:*", + "matchCriteriaId": "0390EFCA-87B4-42D6-817A-603765F49816" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", @@ -92,21 +107,6 @@ "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "matchCriteriaId": "09BF0981-749E-470B-A7AC-95AD087797EF" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2007:-:sp3:*:*:*:*:*:*", - "matchCriteriaId": "854B70F5-EFFC-4352-B7A2-6704E77984AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2010:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "99403426-785A-421E-9814-F3DA39B6C00A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2013_rt:-:sp1:*:*:*:*:*:*", - "matchCriteriaId": "73C23D80-56F9-4453-8912-787DBF1A92B3" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel_viewer:2007:sp3:*:*:*:*:*:*", diff --git a/CVE-2017/CVE-2017-86xx/CVE-2017-8631.json b/CVE-2017/CVE-2017-86xx/CVE-2017-8631.json index 39302b01d37..e788ebaea9d 100644 --- a/CVE-2017/CVE-2017-86xx/CVE-2017-8631.json +++ b/CVE-2017/CVE-2017-86xx/CVE-2017-8631.json @@ -2,7 +2,7 @@ "id": "CVE-2017-8631", "sourceIdentifier": "secure@microsoft.com", "published": "2017-09-13T01:29:09.660", - "lastModified": "2021-09-13T11:26:08.560", + "lastModified": "2023-10-03T15:38:13.700", "vulnStatus": "Analyzed", "descriptions": [ { @@ -82,6 +82,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2007:*:*:*:*:*:*:*", + "matchCriteriaId": "5A70D659-F648-4870-852A-4E86D1F4B646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2010:*:*:*:*:*:*:*", + "matchCriteriaId": "98BF87B2-CE8F-4977-9436-9BE5821CF1B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:*:*:*", + "matchCriteriaId": "0390EFCA-87B4-42D6-817A-603765F49816" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", @@ -92,21 +107,6 @@ "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "matchCriteriaId": "09BF0981-749E-470B-A7AC-95AD087797EF" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2007:-:sp3:*:*:*:*:*:*", - "matchCriteriaId": "854B70F5-EFFC-4352-B7A2-6704E77984AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2010:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "99403426-785A-421E-9814-F3DA39B6C00A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2013_rt:-:sp1:*:*:*:*:*:*", - "matchCriteriaId": "73C23D80-56F9-4453-8912-787DBF1A92B3" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel_viewer:2007:sp3:*:*:*:*:*:*", diff --git a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000026.json b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000026.json index a293d10df24..0c01dbea008 100644 --- a/CVE-2018/CVE-2018-10000xx/CVE-2018-1000026.json +++ b/CVE-2018/CVE-2018-10000xx/CVE-2018-1000026.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1000026", "sourceIdentifier": "cve@mitre.org", "published": "2018-02-09T23:29:00.823", - "lastModified": "2020-10-15T13:28:10.487", + "lastModified": "2023-10-03T15:39:18.000", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -85,8 +85,30 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.8", - "matchCriteriaId": "6D1F259B-CC2D-4B2D-AA8F-C2A1D1530D3D" + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "4.4.181", + "matchCriteriaId": "E9BD059E-0E25-41ED-A976-9EAAAE342D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5.0", + "versionEndExcluding": "4.9.159", + "matchCriteriaId": "1D52E04F-4695-4B29-9C59-6C957C917EE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.102", + "matchCriteriaId": "1D1C9382-DD8A-4D92-A386-5AE70DBCCD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.16", + "matchCriteriaId": "5C32011E-D7F2-4DAE-BC2E-FAF1844F8BE1" } ] } diff --git a/CVE-2018/CVE-2018-10xx/CVE-2018-1027.json b/CVE-2018/CVE-2018-10xx/CVE-2018-1027.json index b398eff7cd9..08aefc333e8 100644 --- a/CVE-2018/CVE-2018-10xx/CVE-2018-1027.json +++ b/CVE-2018/CVE-2018-10xx/CVE-2018-1027.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1027", "sourceIdentifier": "secure@microsoft.com", "published": "2018-04-12T01:29:10.127", - "lastModified": "2020-08-24T17:37:01.140", + "lastModified": "2023-10-03T15:37:53.357", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -82,26 +82,26 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2007:*:*:*:*:*:*:*", + "matchCriteriaId": "5A70D659-F648-4870-852A-4E86D1F4B646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2010:*:*:*:*:*:*:*", + "matchCriteriaId": "98BF87B2-CE8F-4977-9436-9BE5821CF1B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:*:*:*", + "matchCriteriaId": "0390EFCA-87B4-42D6-817A-603765F49816" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "F564117D-450D-45C4-9688-AF35F630A8A7" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2007:-:sp3:*:*:*:*:*:*", - "matchCriteriaId": "854B70F5-EFFC-4352-B7A2-6704E77984AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2010:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "99403426-785A-421E-9814-F3DA39B6C00A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2013_rt:-:sp1:*:*:*:*:*:*", - "matchCriteriaId": "73C23D80-56F9-4453-8912-787DBF1A92B3" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*", diff --git a/CVE-2018/CVE-2018-10xx/CVE-2018-1029.json b/CVE-2018/CVE-2018-10xx/CVE-2018-1029.json index c67d5cd0db9..407bc7000b5 100644 --- a/CVE-2018/CVE-2018-10xx/CVE-2018-1029.json +++ b/CVE-2018/CVE-2018-10xx/CVE-2018-1029.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1029", "sourceIdentifier": "secure@microsoft.com", "published": "2018-04-12T01:29:10.220", - "lastModified": "2020-08-24T17:37:01.140", + "lastModified": "2023-10-03T15:38:36.353", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -82,6 +82,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2007:*:*:*:*:*:*:*", + "matchCriteriaId": "5A70D659-F648-4870-852A-4E86D1F4B646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2010:*:*:*:*:*:*:*", + "matchCriteriaId": "98BF87B2-CE8F-4977-9436-9BE5821CF1B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:*:*:*", + "matchCriteriaId": "0390EFCA-87B4-42D6-817A-603765F49816" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", @@ -102,21 +117,6 @@ "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:click-to-run:*:*:*", "matchCriteriaId": "14F42778-339E-4949-A43D-6E74FA9C0F43" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2007:-:sp3:*:*:*:*:*:*", - "matchCriteriaId": "854B70F5-EFFC-4352-B7A2-6704E77984AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2010:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "99403426-785A-421E-9814-F3DA39B6C00A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2013_rt:-:sp1:*:*:*:*:*:*", - "matchCriteriaId": "73C23D80-56F9-4453-8912-787DBF1A92B3" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel_viewer:2007:sp3:*:*:*:*:*:*", diff --git a/CVE-2018/CVE-2018-154xx/CVE-2018-15471.json b/CVE-2018/CVE-2018-154xx/CVE-2018-15471.json index 8669200aaf2..666f3da6ba7 100644 --- a/CVE-2018/CVE-2018-154xx/CVE-2018-15471.json +++ b/CVE-2018/CVE-2018-154xx/CVE-2018-15471.json @@ -2,8 +2,8 @@ "id": "CVE-2018-15471", "sourceIdentifier": "cve@mitre.org", "published": "2018-08-17T18:29:01.100", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2023-10-03T15:39:07.210", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -101,8 +101,23 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "4.18.1", - "matchCriteriaId": "EDCD90EE-FACC-4FAE-A840-91E68E15E3F6" + "versionStartIncluding": "4.7", + "versionEndExcluding": "4.9.133", + "matchCriteriaId": "73ABE4D9-7599-4DA0-B3E3-8A903FB370FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.76", + "matchCriteriaId": "8D285C7D-A19B-4F9C-8D23-7B318C8E1207" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.18.14", + "matchCriteriaId": "7085CAAC-A121-419C-99B3-D78D40981063" } ] } @@ -156,7 +171,11 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/3819-1/", diff --git a/CVE-2018/CVE-2018-83xx/CVE-2018-8375.json b/CVE-2018/CVE-2018-83xx/CVE-2018-8375.json index bed380a1af5..cf399fb753e 100644 --- a/CVE-2018/CVE-2018-83xx/CVE-2018-8375.json +++ b/CVE-2018/CVE-2018-83xx/CVE-2018-8375.json @@ -2,7 +2,7 @@ "id": "CVE-2018-8375", "sourceIdentifier": "secure@microsoft.com", "published": "2018-08-15T17:29:06.907", - "lastModified": "2020-08-24T17:37:01.140", + "lastModified": "2023-10-03T15:35:57.880", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -87,6 +87,11 @@ "criteria": "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "E36D981E-E56D-46C7-9486-FC691A75C497" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:*:*:*", + "matchCriteriaId": "0390EFCA-87B4-42D6-817A-603765F49816" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", @@ -102,11 +107,6 @@ "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:click-to-run:*:*:*", "matchCriteriaId": "14F42778-339E-4949-A43D-6E74FA9C0F43" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2013_rt:sp1:*:*:*:*:*:*:*", - "matchCriteriaId": "F5CFE1C2-891F-4A90-8912-82D2F2132A65" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel_viewer:2007:sp3:*:*:*:*:*:*", diff --git a/CVE-2019/CVE-2019-170xx/CVE-2019-17075.json b/CVE-2019/CVE-2019-170xx/CVE-2019-17075.json index f08e965cf5c..a6d8f053ee3 100644 --- a/CVE-2019/CVE-2019-170xx/CVE-2019-17075.json +++ b/CVE-2019/CVE-2019-170xx/CVE-2019-17075.json @@ -2,8 +2,8 @@ "id": "CVE-2019-17075", "sourceIdentifier": "cve@mitre.org", "published": "2019-10-01T21:15:11.523", - "lastModified": "2021-06-14T18:15:17.350", - "vulnStatus": "Modified", + "lastModified": "2023-10-03T15:39:01.010", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,8 +85,37 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.3.2", - "matchCriteriaId": "6098E9F1-1520-4DC7-AC82-4D7506570A02" + "versionStartIncluding": "2.6.35", + "versionEndExcluding": "4.4.198", + "matchCriteriaId": "F79F43CF-FD25-4BAB-99CE-904F6DE86B25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5.0", + "versionEndExcluding": "4.9.198", + "matchCriteriaId": "B2837C6F-28EF-4180-8A29-F5AFEF4BBAD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.151", + "matchCriteriaId": "DC97B286-B936-4CB5-A2B5-113C41DD5C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.81", + "matchCriteriaId": "AD6A6AF5-0D02-4C31-8D58-6F1E761A5EDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.3.8", + "matchCriteriaId": "6565D881-E407-4758-A217-2857C6A12DC5" } ] } @@ -96,11 +125,18 @@ "references": [ { "url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lore.kernel.org/lkml/20191001165611.GA3542072@kroah.com", @@ -113,31 +149,58 @@ }, { "url": "https://seclists.org/bugtraq/2019/Nov/11", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4208-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://usn.ubuntu.com/4210-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://usn.ubuntu.com/4211-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://usn.ubuntu.com/4211-2/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://usn.ubuntu.com/4226-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-193xx/CVE-2019-19377.json b/CVE-2019/CVE-2019-193xx/CVE-2019-19377.json index 347cd96256c..b881d08ae8a 100644 --- a/CVE-2019/CVE-2019-193xx/CVE-2019-19377.json +++ b/CVE-2019/CVE-2019-193xx/CVE-2019-19377.json @@ -2,8 +2,8 @@ "id": "CVE-2019-19377", "sourceIdentifier": "cve@mitre.org", "published": "2019-11-29T16:15:10.517", - "lastModified": "2020-12-11T00:15:10.987", - "vulnStatus": "Modified", + "lastModified": "2023-10-03T15:39:14.487", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -84,8 +84,61 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "38A8931B-87F4-4F2A-87CE-AB8DD402BE9F" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "4.19.156", + "matchCriteriaId": "FEF9E401-2486-49E5-8795-702F486B9AD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.33", + "matchCriteriaId": "5A10313D-A457-4D97-9A09-AFE261B7444D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5.0", + "versionEndExcluding": "5.5.18", + "matchCriteriaId": "9ED4694C-99BC-4757-A014-069C85682174" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.6.5", + "matchCriteriaId": "7C0127E0-C515-4329-BC15-BF1369EEF206" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", + "matchCriteriaId": "090AA6F4-4404-4E26-82AB-C3A22636F276" } ] } @@ -103,23 +156,40 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20200103-0001/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://usn.ubuntu.com/4367-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4369-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4414-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-194xx/CVE-2019-19447.json b/CVE-2019/CVE-2019-194xx/CVE-2019-19447.json index 9382703af9c..11cab43603b 100644 --- a/CVE-2019/CVE-2019-194xx/CVE-2019-19447.json +++ b/CVE-2019/CVE-2019-194xx/CVE-2019-19447.json @@ -2,8 +2,8 @@ "id": "CVE-2019-19447", "sourceIdentifier": "cve@mitre.org", "published": "2019-12-08T01:15:10.383", - "lastModified": "2020-06-10T13:15:10.477", - "vulnStatus": "Modified", + "lastModified": "2023-10-03T15:38:56.283", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -84,8 +84,92 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "38A8931B-87F4-4F2A-87CE-AB8DD402BE9F" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "3.16.82", + "matchCriteriaId": "F394A6D0-32F1-426F-BE11-4C9CA5883518" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.17", + "versionEndExcluding": "4.4.208", + "matchCriteriaId": "B5795B12-1991-4BF1-81EF-498AF9DE37C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5.0", + "versionEndExcluding": "4.9.208", + "matchCriteriaId": "EDA338C2-413C-4694-928F-798698455346" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.159", + "matchCriteriaId": "6A7DBBB3-CCEB-43B0-9C22-4CB65283A61B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.90", + "matchCriteriaId": "8BAC67B0-9B43-45EB-81B8-1A8C2FC6A011" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.3.17", + "matchCriteriaId": "8660A0D1-7957-4579-AB80-87339F2A165F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.4.4", + "matchCriteriaId": "C217B8EA-00CB-43AF-A799-F96A0A537A4D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EF46487-B64A-454E-AECC-D74B83170ACD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*", + "matchCriteriaId": "DE7C6010-F736-4BDA-9E3B-C4370BBFA149" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", + "matchCriteriaId": "090AA6F4-4404-4E26-82AB-C3A22636F276" } ] } @@ -95,7 +179,10 @@ "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447", @@ -107,19 +194,31 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20200103-0001/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-194xx/CVE-2019-19448.json b/CVE-2019/CVE-2019-194xx/CVE-2019-19448.json index f872a51cc38..dc68c339b31 100644 --- a/CVE-2019/CVE-2019-194xx/CVE-2019-19448.json +++ b/CVE-2019/CVE-2019-194xx/CVE-2019-19448.json @@ -2,7 +2,7 @@ "id": "CVE-2019-19448", "sourceIdentifier": "cve@mitre.org", "published": "2019-12-08T02:15:09.907", - "lastModified": "2023-02-27T15:30:49.347", + "lastModified": "2023-10-03T15:39:10.637", "vulnStatus": "Analyzed", "descriptions": [ { @@ -77,7 +77,6 @@ ], "configurations": [ { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -85,20 +84,58 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "38A8931B-87F4-4F2A-87CE-AB8DD402BE9F" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.31", + "versionEndExcluding": "4.4.233", + "matchCriteriaId": "8FFC885F-CB12-4AC1-8659-E00E68E60D23" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "3CE994B0-FDDE-4646-A4F8-79D15C7C389A" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5.0", + "versionEndExcluding": "4.9.233", + "matchCriteriaId": "53CBDCA0-6BB4-4528-A9F2-92A020AD1828" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.194", + "matchCriteriaId": "A232E36A-D3E3-4569-AAE7-B3ECABCF3FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.141", + "matchCriteriaId": "01FAA5AA-6C47-4603-BD67-F74E56A983E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.60", + "matchCriteriaId": "F6E05426-BC64-4E9B-B2FB-AC9C66F22B86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5.0", + "versionEndExcluding": "5.7.17", + "matchCriteriaId": "6307999E-139C-4328-90EA-509B452BC207" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "5.8.3", + "matchCriteriaId": "9975D134-4AE2-4987-8C50-35F24FAFFA52" } ] } ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -114,7 +151,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -140,7 +176,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", diff --git a/CVE-2020/CVE-2020-292xx/CVE-2020-29239.json b/CVE-2020/CVE-2020-292xx/CVE-2020-29239.json index 0ff10112be7..ba2262dcf60 100644 --- a/CVE-2020/CVE-2020-292xx/CVE-2020-29239.json +++ b/CVE-2020/CVE-2020-292xx/CVE-2020-29239.json @@ -2,7 +2,7 @@ "id": "CVE-2020-29239", "sourceIdentifier": "cve@mitre.org", "published": "2020-12-02T17:15:14.830", - "lastModified": "2020-12-04T16:48:43.963", + "lastModified": "2023-10-03T15:35:38.173", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:online_voting_system_project:online_voting_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "ECC3B251-845F-4FE1-8A9E-FFF2DA5F88B9" + "criteria": "cpe:2.3:a:janobe:online_voting_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3C192377-E478-4D45-9C4A-90AA7443270F" } ] } diff --git a/CVE-2021/CVE-2021-10xx/CVE-2021-1052.json b/CVE-2021/CVE-2021-10xx/CVE-2021-1052.json index fc2848e8d87..498730bb65a 100644 --- a/CVE-2021/CVE-2021-10xx/CVE-2021-1052.json +++ b/CVE-2021/CVE-2021-10xx/CVE-2021-1052.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1052", "sourceIdentifier": "psirt@nvidia.com", "published": "2021-01-08T01:15:14.400", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:35.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -177,6 +177,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-10xx/CVE-2021-1053.json b/CVE-2021/CVE-2021-10xx/CVE-2021-1053.json index eaafc309c50..34c5b8c6493 100644 --- a/CVE-2021/CVE-2021-10xx/CVE-2021-1053.json +++ b/CVE-2021/CVE-2021-10xx/CVE-2021-1053.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1053", "sourceIdentifier": "psirt@nvidia.com", "published": "2021-01-08T01:15:14.463", - "lastModified": "2021-01-14T15:34:17.013", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:35.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -177,6 +177,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-10xx/CVE-2021-1056.json b/CVE-2021/CVE-2021-10xx/CVE-2021-1056.json index 5741c573379..2ef88a1b834 100644 --- a/CVE-2021/CVE-2021-10xx/CVE-2021-1056.json +++ b/CVE-2021/CVE-2021-10xx/CVE-2021-1056.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1056", "sourceIdentifier": "psirt@nvidia.com", "published": "2021-01-08T01:15:14.620", - "lastModified": "2022-03-29T18:05:06.687", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:35.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -120,7 +120,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -151,6 +150,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-10xx/CVE-2021-1076.json b/CVE-2021/CVE-2021-10xx/CVE-2021-1076.json index c74a86180c6..df179e78b5e 100644 --- a/CVE-2021/CVE-2021-10xx/CVE-2021-1076.json +++ b/CVE-2021/CVE-2021-10xx/CVE-2021-1076.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1076", "sourceIdentifier": "psirt@nvidia.com", "published": "2021-04-21T23:15:07.700", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:35.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -200,6 +200,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-10xx/CVE-2021-1077.json b/CVE-2021/CVE-2021-10xx/CVE-2021-1077.json index 823ba4a0806..82518057e57 100644 --- a/CVE-2021/CVE-2021-10xx/CVE-2021-1077.json +++ b/CVE-2021/CVE-2021-10xx/CVE-2021-1077.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1077", "sourceIdentifier": "psirt@nvidia.com", "published": "2021-04-21T23:15:07.733", - "lastModified": "2021-05-03T14:58:03.867", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:35.617", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -142,6 +142,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-10xx/CVE-2021-1090.json b/CVE-2021/CVE-2021-10xx/CVE-2021-1090.json index f3d4edc8f3c..0b367ffda29 100644 --- a/CVE-2021/CVE-2021-10xx/CVE-2021-1090.json +++ b/CVE-2021/CVE-2021-10xx/CVE-2021-1090.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1090", "sourceIdentifier": "psirt@nvidia.com", "published": "2021-07-22T05:15:07.680", - "lastModified": "2021-07-30T16:15:39.783", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:35.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -136,6 +136,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-10xx/CVE-2021-1093.json b/CVE-2021/CVE-2021-10xx/CVE-2021-1093.json index c70a0c64f48..a433e677ab8 100644 --- a/CVE-2021/CVE-2021-10xx/CVE-2021-1093.json +++ b/CVE-2021/CVE-2021-10xx/CVE-2021-1093.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1093", "sourceIdentifier": "psirt@nvidia.com", "published": "2021-07-22T05:15:07.937", - "lastModified": "2022-03-09T21:35:44.500", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:35.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -180,6 +180,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-10xx/CVE-2021-1094.json b/CVE-2021/CVE-2021-10xx/CVE-2021-1094.json index cb10ac7f51e..be1e20dfc23 100644 --- a/CVE-2021/CVE-2021-10xx/CVE-2021-1094.json +++ b/CVE-2021/CVE-2021-10xx/CVE-2021-1094.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1094", "sourceIdentifier": "psirt@nvidia.com", "published": "2021-07-22T05:15:08.023", - "lastModified": "2022-06-28T14:11:45.273", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:35.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -180,6 +180,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-10xx/CVE-2021-1095.json b/CVE-2021/CVE-2021-10xx/CVE-2021-1095.json index 166e8eff3ab..1d8435b4d39 100644 --- a/CVE-2021/CVE-2021-10xx/CVE-2021-1095.json +++ b/CVE-2021/CVE-2021-10xx/CVE-2021-1095.json @@ -2,8 +2,8 @@ "id": "CVE-2021-1095", "sourceIdentifier": "psirt@nvidia.com", "published": "2021-07-22T05:15:08.113", - "lastModified": "2022-03-09T21:46:55.617", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:35.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -180,6 +180,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-14xx/CVE-2021-1419.json b/CVE-2021/CVE-2021-14xx/CVE-2021-1419.json index 35abb4ae4fe..21201926dd4 100644 --- a/CVE-2021/CVE-2021-14xx/CVE-2021-1419.json +++ b/CVE-2021/CVE-2021-14xx/CVE-2021-1419.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1419", "sourceIdentifier": "ykramarz@cisco.com", "published": "2021-09-23T03:15:07.697", - "lastModified": "2022-07-08T18:23:50.620", + "lastModified": "2023-10-03T15:38:50.257", "vulnStatus": "Analyzed", "descriptions": [ { @@ -549,8 +549,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:esw-6300_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7278A1F6-3C19-4455-9D46-AF250E67F469" + "criteria": "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C" } ] }, @@ -560,8 +560,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:esw-6300:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D2ADAC64-717A-421E-A06C-AFB88FFBBF15" + "criteria": "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09051BC5-CFE7-43EF-975D-BF77724E8776" } ] } @@ -641,15 +641,14 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:cisco:1160:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E056198C-975A-4968-8AE8-786195BFD52D" + "criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350" } ] } ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31478.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31478.json index 18d2790936c..9494c2901a4 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31478.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31478.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31478", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:07.960", - "lastModified": "2021-06-21T20:34:52.113", + "lastModified": "2023-10-03T15:08:36.803", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-618/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31479.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31479.json index bc6e8041f2a..9f9cc56aaa7 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31479.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31479.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31479", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:08.170", - "lastModified": "2021-06-21T20:35:16.840", + "lastModified": "2023-10-03T15:07:58.517", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-619/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31481.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31481.json index 10421a72bc4..13c03234c38 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31481.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31481.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31481", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:08.333", - "lastModified": "2021-06-21T20:13:14.857", + "lastModified": "2023-10-03T15:04:50.687", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-621/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31482.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31482.json index ca3683f2138..81ff19ecad9 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31482.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31482.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31482", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:08.473", - "lastModified": "2021-06-21T20:13:33.657", + "lastModified": "2023-10-03T15:04:21.223", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-622/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31483.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31483.json index 65734af95bd..ae3eb0215ec 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31483.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31483.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31483", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:08.543", - "lastModified": "2021-06-21T20:12:17.110", + "lastModified": "2023-10-03T15:01:24.840", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-623/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31484.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31484.json index bd8da1a83a2..bc54f79acbf 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31484.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31484.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31484", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:08.617", - "lastModified": "2021-06-21T20:05:19.687", + "lastModified": "2023-10-03T15:00:48.267", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-624/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31485.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31485.json index 313cfa4ad1a..f4d0042e218 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31485.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31485.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31485", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:08.690", - "lastModified": "2021-06-21T20:09:48.490", + "lastModified": "2023-10-03T14:16:54.027", "vulnStatus": "Analyzed", "descriptions": [ { @@ -125,6 +125,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-625/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31486.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31486.json index 24813e7b97d..20ea83371b2 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31486.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31486.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31486", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:08.763", - "lastModified": "2021-06-21T18:40:26.640", + "lastModified": "2023-10-03T14:08:56.187", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-626/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31487.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31487.json index f07fa148e75..aeb76d9e59f 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31487.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31487.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31487", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:08.837", - "lastModified": "2021-06-21T18:47:39.353", + "lastModified": "2023-10-03T14:14:36.100", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-627/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31488.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31488.json index 15314301ad5..a9dc08a2426 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31488.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31488.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31488", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:08.930", - "lastModified": "2021-06-21T18:53:27.380", + "lastModified": "2023-10-03T14:09:39.897", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-628/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31489.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31489.json index 33fbc90763c..8b8a58c410b 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31489.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31489.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31489", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:09.013", - "lastModified": "2021-06-21T18:53:46.087", + "lastModified": "2023-10-03T14:07:43.107", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-629/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31490.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31490.json index 6b35397215a..59ffc7c93d0 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31490.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31490.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31490", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:09.103", - "lastModified": "2021-06-21T18:32:37.833", + "lastModified": "2023-10-03T14:06:39.633", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-630/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31491.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31491.json index e6070551f01..e1ee6dc64b3 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31491.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31491.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31491", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:09.183", - "lastModified": "2021-06-21T18:33:11.523", + "lastModified": "2023-10-03T15:12:13.197", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-631/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31492.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31492.json index a2f3f35847d..8169fc2e5aa 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31492.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31492.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31492", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:09.263", - "lastModified": "2021-06-21T18:37:33.423", + "lastModified": "2023-10-03T15:11:40.900", "vulnStatus": "Analyzed", "descriptions": [ { @@ -125,6 +125,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-632/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31493.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31493.json index 86e6a59a547..a761bb6d8d5 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31493.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31493.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31493", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:09.360", - "lastModified": "2022-10-25T23:43:36.317", + "lastModified": "2023-10-03T15:09:56.333", "vulnStatus": "Analyzed", "descriptions": [ { @@ -125,6 +125,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-633/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31494.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31494.json index f74ab495167..e9b39108343 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31494.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31494.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31494", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:10.360", - "lastModified": "2021-06-21T18:18:37.247", + "lastModified": "2023-10-03T14:04:47.637", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-634/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31496.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31496.json index e16f1785593..610fb9483f2 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31496.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31496.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31496", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:10.507", - "lastModified": "2021-06-21T18:25:00.220", + "lastModified": "2023-10-03T14:03:52.317", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-636/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-314xx/CVE-2021-31497.json b/CVE-2021/CVE-2021-314xx/CVE-2021-31497.json index b88a5423910..af4c2b72db7 100644 --- a/CVE-2021/CVE-2021-314xx/CVE-2021-31497.json +++ b/CVE-2021/CVE-2021-314xx/CVE-2021-31497.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31497", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2021-06-15T19:15:10.580", - "lastModified": "2021-06-21T18:09:30.010", + "lastModified": "2023-10-03T14:02:50.477", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,6 +115,20 @@ } ], "references": [ + { + "url": "https://www.cvedetails.com/vulnerability-list/vendor_id-2032/product_id-96672/Opentext-Brava-Desktop.html?page=1&opec=1&order=1&trc=35&sha=37f4ed0596f8ccacca7d571f22a38c97b0f19f4c", + "source": "nvd@nist.gov", + "tags": [ + "Product" + ] + }, + { + "url": "https://www.opentext.com/products/brava", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-637/", "source": "zdi-disclosures@trendmicro.com", diff --git a/CVE-2021/CVE-2021-386xx/CVE-2021-38655.json b/CVE-2021/CVE-2021-386xx/CVE-2021-38655.json index 9eccc15b673..98df4d4c24a 100644 --- a/CVE-2021/CVE-2021-386xx/CVE-2021-38655.json +++ b/CVE-2021/CVE-2021-386xx/CVE-2021-38655.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38655", "sourceIdentifier": "secure@microsoft.com", "published": "2021-09-15T12:15:15.537", - "lastModified": "2021-09-24T19:11:02.480", + "lastModified": "2023-10-03T15:37:30.607", "vulnStatus": "Analyzed", "descriptions": [ { @@ -87,6 +87,11 @@ "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2013:*:*:*:*:*:*:*", + "matchCriteriaId": "0390EFCA-87B4-42D6-817A-603765F49816" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", @@ -97,11 +102,6 @@ "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "matchCriteriaId": "09BF0981-749E-470B-A7AC-95AD087797EF" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:excel_2013_rt:-:sp1:*:*:*:*:*:*", - "matchCriteriaId": "73C23D80-56F9-4453-8912-787DBF1A92B3" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", diff --git a/CVE-2022/CVE-2022-07xx/CVE-2022-0711.json b/CVE-2022/CVE-2022-07xx/CVE-2022-0711.json index 21e0f307743..98e7a527436 100644 --- a/CVE-2022/CVE-2022-07xx/CVE-2022-0711.json +++ b/CVE-2022/CVE-2022-07xx/CVE-2022-0711.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0711", "sourceIdentifier": "secalert@redhat.com", "published": "2022-03-02T22:15:08.313", - "lastModified": "2022-07-21T12:30:58.467", + "lastModified": "2023-10-03T14:59:28.643", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,8 +96,22 @@ "vulnerable": true, "criteria": "cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.2.0", - "versionEndExcluding": "2.5.2", - "matchCriteriaId": "B8577E63-0409-4892-9700-609CB8822C00" + "versionEndExcluding": "2.2.21", + "matchCriteriaId": "987A71FD-A6E5-427C-A1B1-F446E56B38AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3.0", + "versionEndExcluding": "2.3.18", + "matchCriteriaId": "BFEAE9A0-3458-4316-8091-B2F8D8D6B560" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.4.0", + "versionEndExcluding": "2.4.13", + "matchCriteriaId": "5BBF0322-D3FB-4136-89D6-D1421B878244" } ] } diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21813.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21813.json index 2820c28b209..8c8c65dea6a 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21813.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21813.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21813", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-02-07T20:15:07.773", - "lastModified": "2023-01-24T15:40:09.170", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:36.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -18,7 +18,7 @@ "cvssMetricV31": [ { "source": "psirt@nvidia.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", @@ -156,6 +156,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21814.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21814.json index 589748a93e4..c1fdb0cd49e 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21814.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21814.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21814", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-02-07T20:15:07.830", - "lastModified": "2022-09-03T03:54:59.230", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:36.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -18,7 +18,7 @@ "cvssMetricV31": [ { "source": "psirt@nvidia.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", @@ -146,6 +146,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-266xx/CVE-2022-26634.json b/CVE-2022/CVE-2022-266xx/CVE-2022-26634.json index c6beae00f14..ff7d2c30b50 100644 --- a/CVE-2022/CVE-2022-266xx/CVE-2022-26634.json +++ b/CVE-2022/CVE-2022-266xx/CVE-2022-26634.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26634", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-20T13:15:14.870", - "lastModified": "2022-06-01T15:48:23.000", + "lastModified": "2023-10-03T15:35:49.437", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:hidemyass:hidemyass:5.3.5913.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B6E32C0E-1F68-4D7B-9CEA-26A1AD5DA36B" + "criteria": "cpe:2.3:a:hma:hidemyass:5.3.5913.0:*:*:*:*:*:*:*", + "matchCriteriaId": "37F60D9A-826A-4C10-B059-16E6DE83847B" } ] } diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28181.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28181.json index 3deaa3e49f0..64f850814c3 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28181.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28181.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28181", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-05-17T20:15:08.673", - "lastModified": "2022-05-26T18:59:00.143", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:36.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -18,7 +18,7 @@ "cvssMetricV31": [ { "source": "psirt@nvidia.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -133,7 +133,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -162,6 +161,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28183.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28183.json index bdf4bf21b9b..cbed5e02574 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28183.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28183.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28183", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-05-17T20:15:08.790", - "lastModified": "2022-05-26T19:06:31.863", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:36.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -154,6 +154,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28184.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28184.json index 01a314dd0b8..8cf9986a45a 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28184.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28184.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28184", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-05-17T20:15:08.843", - "lastModified": "2022-10-11T20:35:23.513", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:36.453", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -154,6 +154,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28185.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28185.json index 2f85eec6821..6bbcbfaacd8 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28185.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28185.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28185", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-05-17T20:15:08.897", - "lastModified": "2022-10-11T20:35:56.527", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:36.543", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -154,6 +154,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31607.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31607.json index ca026ff7df2..c66d572aec6 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31607.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31607.json @@ -2,8 +2,8 @@ "id": "CVE-2022-31607", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-11-19T00:15:23.190", - "lastModified": "2022-11-29T15:42:21.717", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:36.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -264,6 +264,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31608.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31608.json index 90e02666dc9..88ca941864c 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31608.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31608.json @@ -2,8 +2,8 @@ "id": "CVE-2022-31608", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-11-19T00:15:24.927", - "lastModified": "2022-11-28T20:23:12.070", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:36.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -236,6 +236,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31615.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31615.json index d98d495dcf8..440464e93a3 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31615.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31615.json @@ -2,8 +2,8 @@ "id": "CVE-2022-31615", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-11-19T00:15:26.543", - "lastModified": "2022-11-29T16:17:17.250", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:36.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -236,6 +236,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34665.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34665.json index d84c5efa747..9cbdb57ba8e 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34665.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34665.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34665", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-11-19T00:15:27.557", - "lastModified": "2022-11-29T15:36:32.450", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:36.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -318,6 +318,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34666.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34666.json index c38c1e5e57e..2b18377f755 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34666.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34666.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34666", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-11-10T16:15:10.520", - "lastModified": "2023-01-31T20:17:23.317", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:37.050", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -198,6 +198,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34670.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34670.json index d1810a12697..191ddec37fd 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34670.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34670.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34670", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:09.337", - "lastModified": "2023-05-11T18:15:09.800", + "lastModified": "2023-10-03T15:15:37.157", "vulnStatus": "Modified", "descriptions": [ { @@ -336,6 +336,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34673.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34673.json index 3d9a6b8ee3e..2131eb3807f 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34673.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34673.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34673", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:09.610", - "lastModified": "2023-01-06T20:48:46.963", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:37.273", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -134,6 +134,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34674.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34674.json index 952d988e100..52a2c686d30 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34674.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34674.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34674", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:09.710", - "lastModified": "2023-05-11T18:15:09.957", + "lastModified": "2023-10-03T15:15:37.380", "vulnStatus": "Modified", "descriptions": [ { @@ -336,6 +336,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34676.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34676.json index 945384bf1af..a2fc167c9ef 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34676.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34676.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34676", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:09.903", - "lastModified": "2023-01-06T20:40:09.487", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:37.477", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -203,6 +203,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34677.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34677.json index 90e03d9e09a..70613c66585 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34677.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34677.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34677", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:09.983", - "lastModified": "2023-05-11T18:15:10.167", + "lastModified": "2023-10-03T15:15:37.563", "vulnStatus": "Modified", "descriptions": [ { @@ -336,6 +336,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34678.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34678.json index a739cf9053c..b470dde07af 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34678.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34678.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34678", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:10.073", - "lastModified": "2023-01-06T20:53:51.117", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:37.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -273,6 +273,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34679.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34679.json index f4468c2a7ff..f60b190af6c 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34679.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34679.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34679", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:10.163", - "lastModified": "2023-01-06T20:51:37.803", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:37.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -203,6 +203,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34680.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34680.json index 3caabf8cd04..58ceb95d785 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34680.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34680.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34680", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:10.247", - "lastModified": "2023-05-11T18:15:10.287", + "lastModified": "2023-10-03T15:15:37.857", "vulnStatus": "Modified", "descriptions": [ { @@ -336,6 +336,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34682.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34682.json index b7344d8f3dc..48c15e150e1 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34682.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34682.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34682", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:10.417", - "lastModified": "2023-01-06T21:06:14.700", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:37.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -203,6 +203,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34684.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34684.json index 871c180dfb3..ab872134162 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34684.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34684.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34684", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:10.583", - "lastModified": "2023-01-11T20:17:34.023", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:38.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -259,6 +259,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42254.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42254.json index b62860762c5..8f1f892c287 100644 --- a/CVE-2022/CVE-2022-422xx/CVE-2022-42254.json +++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42254.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42254", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:10.657", - "lastModified": "2023-01-11T20:18:00.527", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:38.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -266,6 +266,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42255.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42255.json index 1e5015ff00e..6d38037a5d1 100644 --- a/CVE-2022/CVE-2022-422xx/CVE-2022-42255.json +++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42255.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42255", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:10.753", - "lastModified": "2023-01-06T21:48:58.677", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:38.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -203,6 +203,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42256.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42256.json index 19b418beb28..c0bee598402 100644 --- a/CVE-2022/CVE-2022-422xx/CVE-2022-42256.json +++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42256.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42256", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:10.830", - "lastModified": "2023-01-06T21:48:47.690", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:38.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -203,6 +203,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42257.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42257.json index c1c56c4195e..68124bd97d4 100644 --- a/CVE-2022/CVE-2022-422xx/CVE-2022-42257.json +++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42257.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42257", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:10.897", - "lastModified": "2023-05-11T18:15:10.413", + "lastModified": "2023-10-03T15:15:38.417", "vulnStatus": "Modified", "descriptions": [ { @@ -336,6 +336,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42258.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42258.json index 8022066cfbb..c96b1a0d41c 100644 --- a/CVE-2022/CVE-2022-422xx/CVE-2022-42258.json +++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42258.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42258", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:10.963", - "lastModified": "2023-05-11T18:15:10.540", + "lastModified": "2023-10-03T15:15:38.520", "vulnStatus": "Modified", "descriptions": [ { @@ -336,6 +336,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42259.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42259.json index 7250775aa99..7bbab51ed7a 100644 --- a/CVE-2022/CVE-2022-422xx/CVE-2022-42259.json +++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42259.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42259", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:11.030", - "lastModified": "2023-05-11T18:15:10.693", + "lastModified": "2023-10-03T15:15:38.620", "vulnStatus": "Modified", "descriptions": [ { @@ -336,6 +336,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42260.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42260.json index da1880c76ec..63cf5ebb168 100644 --- a/CVE-2022/CVE-2022-422xx/CVE-2022-42260.json +++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42260.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42260", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:11.097", - "lastModified": "2023-01-11T20:20:08.873", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:38.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -297,6 +297,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42261.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42261.json index a82b9dc577d..f2927b3e1db 100644 --- a/CVE-2022/CVE-2022-422xx/CVE-2022-42261.json +++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42261.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42261", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:11.167", - "lastModified": "2023-01-11T20:21:52.190", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:38.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -269,6 +269,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42263.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42263.json index f461c4c4040..f070a7c37f1 100644 --- a/CVE-2022/CVE-2022-422xx/CVE-2022-42263.json +++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42263.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42263", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:11.360", - "lastModified": "2023-01-11T20:23:35.483", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:38.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -304,6 +304,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42264.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42264.json index ad893d99efb..1632e03d536 100644 --- a/CVE-2022/CVE-2022-422xx/CVE-2022-42264.json +++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42264.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42264", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:11.443", - "lastModified": "2023-01-11T20:24:09.707", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:39.003", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -304,6 +304,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42265.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42265.json index 4f8ac25a3d3..e2e40c950aa 100644 --- a/CVE-2022/CVE-2022-422xx/CVE-2022-42265.json +++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42265.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42265", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-12-30T23:15:11.513", - "lastModified": "2023-01-12T16:54:32.133", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:39.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -134,6 +134,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46387.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46387.json index a71f76e2a2e..99abc8f30be 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46387.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46387.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46387", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-28T20:15:10.940", - "lastModified": "2023-04-05T03:37:06.107", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:18:36.107", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -71,9 +71,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:conemu_project:conemu:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:maximus5:conemu:*:*:*:*:*:*:*:*", "versionEndIncluding": "220807", - "matchCriteriaId": "0F30285A-67CE-49C7-848E-61A175D1CE4F" + "matchCriteriaId": "09AD260D-2D25-4D35-9A74-981B2C5EBCAA" } ] } diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0180.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0180.json index a6fb7628c4e..f7bef1f49a6 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0180.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0180.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0180", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-01T05:15:07.160", - "lastModified": "2023-04-10T16:17:44.563", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:39.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -142,6 +142,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0181.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0181.json index aae78fa8a4e..b82dba71c3c 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0181.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0181.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0181", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-01T05:15:07.713", - "lastModified": "2023-04-10T16:36:34.803", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:39.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -147,6 +147,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0183.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0183.json index e4643eb0413..fb35d58fd3a 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0183.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0183.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0183", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-01T05:15:07.867", - "lastModified": "2023-04-07T16:53:05.580", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:39.383", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -142,6 +142,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0184.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0184.json index 273cd17c6e4..283f89b1ce3 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0184.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0184.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0184", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-22T03:15:08.817", - "lastModified": "2023-05-02T14:24:17.237", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:39.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -326,6 +326,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0185.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0185.json index b491a7c30e4..c192596c37c 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0185.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0185.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0185", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-01T05:15:07.927", - "lastModified": "2023-04-10T16:35:23.280", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:39.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -137,6 +137,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0187.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0187.json index c583afdd956..9e54e49a950 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0187.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0187.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0187", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-01T05:15:08.053", - "lastModified": "2023-04-07T15:10:39.060", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:39.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -127,6 +127,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0188.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0188.json index 70148b62ce8..3d26c18158a 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0188.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0188.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0188", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-01T05:15:08.110", - "lastModified": "2023-04-07T15:17:08.770", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:39.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -147,6 +147,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0189.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0189.json index e65e24fd832..54f7803000d 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0189.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0189.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0189", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-01T05:15:08.163", - "lastModified": "2023-04-07T14:56:28.777", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:39.823", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -127,6 +127,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0190.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0190.json index 2c29426fe98..91be0d7cb8f 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0190.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0190.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0190", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-22T03:15:08.897", - "lastModified": "2023-05-02T14:24:38.437", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:39.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -179,6 +179,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0191.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0191.json index d7985f2ba26..f0af3b292e4 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0191.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0191.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0191", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-01T05:15:08.240", - "lastModified": "2023-04-07T14:53:23.500", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:39.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -147,6 +147,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0194.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0194.json index 949c83ea135..8fb66505595 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0194.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0194.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0194", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-01T05:15:08.367", - "lastModified": "2023-04-10T14:10:11.457", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:40.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -132,6 +132,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0195.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0195.json index 3fdead11b49..9f85ddcac26 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0195.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0195.json @@ -2,12 +2,12 @@ "id": "CVE-2023-0195", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-01T05:15:08.440", - "lastModified": "2023-04-10T14:08:03.647", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:40.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer driver nvlddmkm.sys, where an can cause CWE-1284, which may lead to hypothetical Information leak of unimportant data such as local variable data of the driver" + "value": "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer driver nvlddmkm.sys, where an can cause CWE-1284,\nwhich may lead to hypothetical Information leak of unimportant data such as local variable data of the driver" } ], "metrics": { @@ -127,6 +127,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0198.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0198.json index c96b5940d35..9b8af4e16e7 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0198.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0198.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0198", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-01T05:15:08.557", - "lastModified": "2023-04-10T14:03:21.060", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:40.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -142,6 +142,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0199.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0199.json index 1950f6448b3..837be00afa5 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0199.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0199.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0199", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-22T03:15:08.970", - "lastModified": "2023-05-02T14:25:09.480", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:15:40.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -326,6 +326,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202310-02", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0506.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0506.json new file mode 100644 index 00000000000..b6015fc4694 --- /dev/null +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0506.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-0506", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2023-10-03T14:15:10.473", + "lastModified": "2023-10-03T14:29:08.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The web service of ByDemes Group Airspace CCTV Web Service in its 2.616.BY00.11 version, contains a privilege escalation vulnerability, detected in the Camera Control Panel, whose exploitation could allow a low-privileged attacker to gain administrator access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zerolynx/wstg/blob/master/document/4-Web_Application_Security_Testing/05-Authorization_Testing/02-Testing_for_Bypassing_Authorization_Schema.md", + "source": "cve-coordination@incibe.es" + }, + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-demes-group-products", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20034.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20034.json index 2a2bcd6c1fe..66e429b7a53 100644 --- a/CVE-2023/CVE-2023-200xx/CVE-2023-20034.json +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20034.json @@ -2,16 +2,40 @@ "id": "CVE-2023-20034", "sourceIdentifier": "ykramarz@cisco.com", "published": "2023-09-27T18:15:10.793", - "lastModified": "2023-09-27T18:31:27.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-03T15:52:00.450", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Vulnerability in the Elasticsearch database used in the of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to access the Elasticsearch configuration database of an affected device with the privileges of the elasticsearch user.\r\n\r These vulnerability is due to the presence of a static username and password configured on the vManage. An attacker could exploit this vulnerability by sending a crafted HTTP request to a reachable vManage on port 9200. A successful exploit could allow the attacker to view the Elasticsearch database content.\r\n\r There are workarounds that address this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la base de datos de Elasticsearch utilizada en el software Cisco SD-WAN vManage podr\u00eda permitir que un atacante remoto no autenticado acceda a la base de datos de configuraci\u00f3n de Elasticsearch de un dispositivo afectado con los privilegios del usuario de elasticsearch. Esta vulnerabilidad se debe a la presencia de un nombre de usuario y una contrase\u00f1a est\u00e1ticos configurados en vManage. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada a un vManage accesible en el puerto 9200. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ver el contenido de la base de datos de Elasticsearch. Existen workarounds que abordan esta vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -34,10 +58,55 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.3", + "versionEndExcluding": "20.3.4", + "matchCriteriaId": "EE777DCB-F32F-4ED5-859E-65C379FCE51F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan:20.6:*:*:*:*:*:*:*", + "matchCriteriaId": "CC4251C4-075F-4EBB-A85E-822CC4B66923" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan:20.7:*:*:*:*:*:*:*", + "matchCriteriaId": "02F3E534-8F56-448C-94E4-86C81B8D38FD" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2344.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2344.json index 2a7dc2c0f63..9aa3da49ec6 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2344.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2344.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2344", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-27T14:15:09.240", - "lastModified": "2023-05-04T20:00:56.577", + "lastModified": "2023-10-03T15:48:54.623", "vulnStatus": "Analyzed", "descriptions": [ { @@ -102,8 +102,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + "criteria": "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C20DC3-D0C4-4D07-A2AA-8057A70FC448" } ] } diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2345.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2345.json index 8bef79b0c16..8ef3660a46d 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2345.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2345.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2345", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-27T15:15:13.187", - "lastModified": "2023-05-03T16:59:03.360", + "lastModified": "2023-10-03T15:49:16.837", "vulnStatus": "Analyzed", "descriptions": [ { @@ -102,8 +102,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + "criteria": "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C20DC3-D0C4-4D07-A2AA-8057A70FC448" } ] } diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2346.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2346.json index 825998bc07e..578dda41ed7 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2346.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2346.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2346", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-27T15:15:13.400", - "lastModified": "2023-05-03T16:58:35.860", + "lastModified": "2023-10-03T15:48:58.363", "vulnStatus": "Analyzed", "descriptions": [ { @@ -102,8 +102,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + "criteria": "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C20DC3-D0C4-4D07-A2AA-8057A70FC448" } ] } diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2347.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2347.json index d444d7708a2..3a5b446638b 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2347.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2347.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2347", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-27T15:15:13.617", - "lastModified": "2023-05-03T16:58:18.770", + "lastModified": "2023-10-03T15:49:20.097", "vulnStatus": "Analyzed", "descriptions": [ { @@ -102,8 +102,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + "criteria": "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C20DC3-D0C4-4D07-A2AA-8057A70FC448" } ] } diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2348.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2348.json index 3db829a20ab..fdd1ca5955d 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2348.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2348.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2348", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-27T15:15:13.723", - "lastModified": "2023-05-03T16:57:42.023", + "lastModified": "2023-10-03T15:49:02.083", "vulnStatus": "Analyzed", "descriptions": [ { @@ -102,8 +102,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + "criteria": "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C20DC3-D0C4-4D07-A2AA-8057A70FC448" } ] } diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2349.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2349.json index fe714536ee7..60d9498156e 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2349.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2349.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2349", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-27T16:15:11.063", - "lastModified": "2023-05-08T20:21:45.167", + "lastModified": "2023-10-03T15:49:23.127", "vulnStatus": "Analyzed", "descriptions": [ { @@ -102,8 +102,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + "criteria": "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C20DC3-D0C4-4D07-A2AA-8057A70FC448" } ] } diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2350.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2350.json index c8cd0e68eea..daea4427059 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2350.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2350.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2350", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-27T16:15:11.207", - "lastModified": "2023-05-08T20:21:55.863", + "lastModified": "2023-10-03T15:49:05.157", "vulnStatus": "Analyzed", "descriptions": [ { @@ -102,8 +102,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + "criteria": "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C20DC3-D0C4-4D07-A2AA-8057A70FC448" } ] } diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2544.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2544.json new file mode 100644 index 00000000000..98de86b2ef9 --- /dev/null +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2544.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-2544", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2023-10-03T14:15:10.637", + "lastModified": "2023-10-03T14:29:08.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Authorization bypass vulnerability in UPV PEIX, affecting the component \"pdf_curri_new.php\". Through a POST request, an authenticated user could change the ID parameter to retrieve all the stored information of other registered users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/authorization-bypass-upv-peix", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26145.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26145.json index ad7206b68f7..d4868d0b28c 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26145.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26145.json @@ -2,16 +2,40 @@ "id": "CVE-2023-26145", "sourceIdentifier": "report@snyk.io", "published": "2023-09-28T05:15:45.843", - "lastModified": "2023-09-28T12:44:04.973", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-03T15:26:34.943", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "This affects versions of the package pydash before 6.0.0. A number of pydash methods such as pydash.objects.invoke() and pydash.collections.invoke_map() accept dotted paths (Deep Path Strings) to target a nested Python object, relative to the original source object. These paths can be used to target internal class attributes and dict items, to retrieve, modify or invoke nested Python objects.\r\r**Note:**\r\rThe pydash.objects.invoke() method is vulnerable to Command Injection when the following prerequisites are satisfied:\r\r1) The source object (argument 1) is not a built-in object such as list/dict (otherwise, the __init__.__globals__ path is not accessible)\r\r2) The attacker has control over argument 2 (the path string) and argument 3 (the argument to pass to the invoked method)\r\r\rThe pydash.collections.invoke_map() method is also vulnerable, but is harder to exploit as the attacker does not have direct control over the argument to be passed to the invoked function." + }, + { + "lang": "es", + "value": "Esto afecta a las versiones del paquete pydash anteriores a la 6.0.0. Varios m\u00e9todos de pydash, como pydash.objects.invoke() y pydash.collections.invoke_map(), aceptan rutas de puntos (Deep Path Strings) para apuntar a un objeto Python anidado, en relaci\u00f3n con el objeto fuente original. Estas rutas se pueden utilizar para apuntar a atributos internos de clase y elementos de dictado, para recuperar, modificar o invocar objetos Python anidados. **Nota:** El m\u00e9todo pydash.objects.invoke() es vulnerable a la inyecci\u00f3n de comandos cuando se cumplen los siguientes requisitos previos: \n1) El objeto fuente (argumento 1) no es un objeto integrado como list/dict (de lo contrario, the __init__.__globals__ path no es accesible) \n2) El atacante tiene control sobre el argumento 2 (la cadena de ruta)\n3) El argumento (el argumento para pasar al m\u00e9todo invocado) \nEl m\u00e9todo pydash.collections.invoke_map() tambi\u00e9n es vulnerable, pero es m\u00e1s dif\u00edcil de explotar ya que el atacante no tiene control directo sobre el argumento que se pasar\u00e1 a la funci\u00f3n invocada.\n" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + }, { "source": "report@snyk.io", "type": "Secondary", @@ -34,18 +58,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:derrickgilland:pydash:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.0.0", + "matchCriteriaId": "78227353-EE51-4D4E-8B42-A4ADE5B179BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/dgilland/pydash/commit/6ff0831ad285fff937cafd2a853f20cc9ae92021", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Patch" + ] }, { "url": "https://security.snyk.io/vuln/SNYK-PYTHON-PYDASH-5916518", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27435.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27435.json new file mode 100644 index 00000000000..10f68b14901 --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27435.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27435", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-10-03T14:15:10.557", + "lastModified": "2023-10-03T14:29:08.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Sami Ahmed Siddiqui HTTP Auth plugin <=\u00a00.3.2 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/http-auth/wordpress-http-auth-plugin-0-3-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2769.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2769.json index 74c8551450c..1e49e71b073 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2769.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2769.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2769", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-17T18:15:09.317", - "lastModified": "2023-05-25T15:59:04.283", + "lastModified": "2023-10-03T15:49:26.707", "vulnStatus": "Analyzed", "descriptions": [ { @@ -102,8 +102,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + "criteria": "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C20DC3-D0C4-4D07-A2AA-8057A70FC448" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3119.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3119.json index c03e9e91440..38df7c6ee36 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3119.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3119.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3119", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-06T11:15:10.063", - "lastModified": "2023-06-09T23:01:04.807", + "lastModified": "2023-10-03T15:49:09.827", "vulnStatus": "Analyzed", "descriptions": [ { @@ -106,8 +106,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + "criteria": "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C20DC3-D0C4-4D07-A2AA-8057A70FC448" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3120.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3120.json index e414141b3b2..6a7e32eb206 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3120.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3120.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3120", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-06T11:15:10.223", - "lastModified": "2023-06-09T23:04:57.477", + "lastModified": "2023-10-03T15:49:30.513", "vulnStatus": "Analyzed", "descriptions": [ { @@ -106,8 +106,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + "criteria": "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C20DC3-D0C4-4D07-A2AA-8057A70FC448" } ] } diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32091.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32091.json new file mode 100644 index 00000000000..538b24019b9 --- /dev/null +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32091.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32091", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-10-03T14:15:10.703", + "lastModified": "2023-10-03T14:29:08.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in POEditor plugin <=\u00a00.9.4 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/poeditor/wordpress-poeditor-plugin-0-9-4-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32477.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32477.json index ca3fe4ff0bb..4504dfe24f1 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32477.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32477.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32477", "sourceIdentifier": "security_alert@emc.com", "published": "2023-09-29T08:15:09.437", - "lastModified": "2023-09-29T12:45:25.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-03T15:57:15.073", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -50,10 +70,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:common_event_enabler:*:*:*:*:*:windows:*:*", + "versionEndIncluding": "8.9.8.2", + "matchCriteriaId": "9BC84FF4-C2BD-4D50-95D2-14FBAB848126" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000218120/dsa-2023-310-security-update-for-dell-emc-common-event-enabler", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3349.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3349.json new file mode 100644 index 00000000000..e06977ca7dd --- /dev/null +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3349.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-3349", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2023-10-03T14:15:10.853", + "lastModified": "2023-10-03T14:29:08.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Information exposure vulnerability in IBERMATICA RPS 2019, which exploitation could allow an unauthenticated user to retrieve sensitive information, such as usernames, IP addresses or SQL queries sent to the application. By accessing the URL /RPS2019Service/status.html, the application enables the logging mechanism by generating the log file, which can be downloaded." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-ibermatica-rps-2019", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3350.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3350.json new file mode 100644 index 00000000000..3892ae257d1 --- /dev/null +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3350.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-3350", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2023-10-03T14:15:10.927", + "lastModified": "2023-10-03T14:29:08.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A Cryptographic Issue vulnerability has been found on IBERMATICA RPS, affecting version 2019. By firstly downloading the log file, an attacker could retrieve the SQL query sent to the application in plaint text. This log file contains the password hashes coded with AES-CBC-128 bits algorithm, which can be decrypted with a .NET function, obtaining the username's password in plain text." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-ibermatica-rps-2019", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3396.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3396.json index acfd1b87382..fd777581f74 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3396.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3396.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3396", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-25T19:15:09.027", - "lastModified": "2023-07-03T13:22:31.247", + "lastModified": "2023-10-03T15:27:07.463", "vulnStatus": "Analyzed", "descriptions": [ { @@ -102,8 +102,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:campcodes_retro_cellphone_online_store_project:campcodes_retro_cellphone_online_store:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F973FF52-9DAE-4760-A387-1EB30F113105" + "criteria": "cpe:2.3:a:retro_cellphone_online_store_project:retro_cellphone_online_store:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A77A0EBC-52BE-4672-A49E-9C10696CD13D" } ] } diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34257.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34257.json index 192eabf8b54..b8f5c59e7f6 100644 --- a/CVE-2023/CVE-2023-342xx/CVE-2023-34257.json +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34257.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34257", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T20:15:10.860", - "lastModified": "2023-06-08T13:42:38.540", + "lastModified": "2023-10-03T15:38:43.973", "vulnStatus": "Analyzed", "descriptions": [ { @@ -55,9 +55,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:bmc:patrol:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:bmc:patrol_agent:*:*:*:*:*:*:*:*", "versionEndIncluding": "23.1.00", - "matchCriteriaId": "195D3820-0A98-497F-9F71-7B4CADBBB53E" + "matchCriteriaId": "62AF36FE-C2D5-4A0C-B30E-3CD2F47BC6E6" } ] } diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34468.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34468.json index 3cc0bfa7772..f02f8c6c578 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34468.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34468.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34468", "sourceIdentifier": "security@apache.org", "published": "2023-06-12T16:15:10.130", - "lastModified": "2023-09-28T22:15:10.027", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-10-03T15:44:19.453", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -68,7 +68,11 @@ "references": [ { "url": "http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/06/12/3", @@ -96,7 +100,10 @@ }, { "url": "https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-345xx/CVE-2023-34581.json b/CVE-2023/CVE-2023-345xx/CVE-2023-34581.json index fd6b187b710..98388a3ab22 100644 --- a/CVE-2023/CVE-2023-345xx/CVE-2023-34581.json +++ b/CVE-2023/CVE-2023-345xx/CVE-2023-34581.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34581", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-12T15:15:09.770", - "lastModified": "2023-06-16T03:57:24.383", + "lastModified": "2023-10-03T15:49:13.333", "vulnStatus": "Analyzed", "descriptions": [ { @@ -55,8 +55,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + "criteria": "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C20DC3-D0C4-4D07-A2AA-8057A70FC448" } ] } diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3446.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3446.json index f34f2bdc40c..c0447bb9e29 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3446.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3446.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3446", "sourceIdentifier": "openssl-security@openssl.org", "published": "2023-07-19T12:15:10.003", - "lastModified": "2023-08-16T08:15:41.420", - "vulnStatus": "Modified", + "lastModified": "2023-10-03T15:48:00.240", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -58,6 +58,11 @@ "criteria": "cpe:2.3:a:openssl:openssl:1.0.2:-:*:*:*:*:*:*", "matchCriteriaId": "CF0E6EB1-D656-458E-82B6-8C1ABDC13CB9" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openssl:openssl:1.1.1:-:*:*:*:*:*:*", + "matchCriteriaId": "A8C84061-63BE-49F6-B2F0-D96847E755E0" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:openssl:openssl:3.0.0:-:*:*:*:*:*:*", @@ -105,14 +110,19 @@ }, { "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1", - "source": "openssl-security@openssl.org" + "source": "openssl-security@openssl.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb", "source": "openssl-security@openssl.org", "tags": [ "Mailing List", - "Patch" + "Patch", + "Vendor Advisory" ] }, { @@ -120,14 +130,16 @@ "source": "openssl-security@openssl.org", "tags": [ "Mailing List", - "Patch" + "Patch", + "Vendor Advisory" ] }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "source": "openssl-security@openssl.org", "tags": [ - "Broken Link" + "Broken Link", + "Vendor Advisory" ] }, { @@ -135,16 +147,24 @@ "source": "openssl-security@openssl.org", "tags": [ "Mailing List", - "Patch" + "Patch", + "Vendor Advisory" ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", - "source": "openssl-security@openssl.org" + "source": "openssl-security@openssl.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230803-0011/", - "source": "openssl-security@openssl.org" + "source": "openssl-security@openssl.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.openssl.org/news/secadv/20230719.txt", diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36658.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36658.json index f3278caffae..68f78166f08 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36658.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36658.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36658", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-15T05:15:24.997", - "lastModified": "2023-09-19T13:08:21.000", + "lastModified": "2023-10-03T15:48:36.427", "vulnStatus": "Analyzed", "descriptions": [ { @@ -21,11 +21,11 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", + "privilegesRequired": "LOW", + "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", @@ -60,15 +60,16 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:opswat:media_validation_agent:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", "versionEndExcluding": "2.0.7", - "matchCriteriaId": "33DFDE4D-99F5-44E7-B1C9-FDD5192E547A" + "matchCriteriaId": "AD0C2D5B-F10D-4B3F-81E4-A260DA6E778D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:opswat:metadefender_kiosk:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.5.0", - "versionEndIncluding": "4.6.1.9996", - "matchCriteriaId": "2F6F9662-1B39-4809-9816-76848FA1C2E5" + "versionStartIncluding": "4.2", + "versionEndExcluding": "4.6.2", + "matchCriteriaId": "653DAC40-4511-4423-9E52-17E723004B1C" } ] } diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3644.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3644.json index 35c0ee7b68d..5080dacf9e8 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3644.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3644.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3644", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-12T18:15:09.563", - "lastModified": "2023-07-20T02:04:50.907", + "lastModified": "2023-10-03T15:40:37.310", "vulnStatus": "Analyzed", "descriptions": [ { @@ -116,8 +116,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:service_provider_management_system_project:service_provider_management_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "72A53E3F-CC8B-4570-9F4F-BA25E7F4F642" + "criteria": "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C20DC3-D0C4-4D07-A2AA-8057A70FC448" } ] } diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39010.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39010.json index c6519b25372..0a43f6d129f 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39010.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39010.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39010", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-28T15:15:12.313", - "lastModified": "2023-08-03T18:10:42.550", + "lastModified": "2023-10-03T15:48:47.203", "vulnStatus": "Analyzed", "descriptions": [ { @@ -59,8 +59,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:lessthanoptimal:boofcv:0.42:*:*:*:*:*:*:*", - "matchCriteriaId": "0F941A07-B1CB-40E7-99C7-0185ED55369B" + "criteria": "cpe:2.3:a:boofcv:boofcv:0.42:*:*:*:*:*:*:*", + "matchCriteriaId": "30A97FE0-E2E4-4A26-99B8-06C162252539" } ] } diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39150.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39150.json index e166d562744..5171df5e9d9 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39150.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39150.json @@ -2,12 +2,16 @@ "id": "CVE-2023-39150", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-12T13:15:07.897", - "lastModified": "2023-09-14T00:45:57.777", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T15:18:36.107", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", "value": "ConEmu before commit 230724 does not sanitize title responses correctly for control characters, potentially leading to arbitrary code execution. This is related to an incomplete fix for CVE-2022-46387." + }, + { + "lang": "es", + "value": "ConEmu antes del commit 230724 no sanitiza correctamente las respuestas de t\u00edtulo para los caracteres de control, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Esto est\u00e1 relacionado con una soluci\u00f3n incompleta para CVE-2022-46387." } ], "metrics": { @@ -55,9 +59,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:conemu_project:conemu:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:maximus5:conemu:*:*:*:*:*:*:*:*", "versionEndExcluding": "230724", - "matchCriteriaId": "F03DAE54-3D7C-4F9D-B47A-9B2C73B6C90E" + "matchCriteriaId": "E6C78256-1423-4111-B59F-656B1ACCED83" } ] } diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39158.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39158.json new file mode 100644 index 00000000000..7bd8a5fe14e --- /dev/null +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39158.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39158", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-10-03T14:15:10.777", + "lastModified": "2023-10-03T14:29:08.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Banner Management For WooCommerce plugin <=\u00a02.4.2 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/banner-management-for-woocommerce/wordpress-banner-management-for-woocommerce-plugin-2-4-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3914.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3914.json index 8b6b269a637..7d159c33f94 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3914.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3914.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3914", "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-29T07:15:13.380", - "lastModified": "2023-09-29T12:45:33.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-03T15:31:20.073", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +80,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "16.2.8", + "matchCriteriaId": "CC944069-5F94-4E2A-A13F-5D070BA4E5EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.3.0", + "versionEndExcluding": "16.3.5", + "matchCriteriaId": "CC5696C9-592A-4D50-B5BB-9A250DAB6589" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:16.4.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "6696C987-61C1-462E-8A73-016F9902BC67" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/418115", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2040822", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3917.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3917.json index be19bcac39a..8c073b813b5 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3917.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3917.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3917", "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-29T07:15:13.557", - "lastModified": "2023-09-29T12:45:25.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-03T15:25:32.763", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +80,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionEndExcluding": "16.2.8", + "matchCriteriaId": "F9180E94-B3C4-4DD4-A2DA-B6E818DAFFF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "16.2.8", + "matchCriteriaId": "CC944069-5F94-4E2A-A13F-5D070BA4E5EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "16.3.0", + "versionEndExcluding": "16.3.5", + "matchCriteriaId": "50271B2B-7070-4ED0-AB68-65B99D44A68A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.3.0", + "versionEndExcluding": "16.3.5", + "matchCriteriaId": "CC5696C9-592A-4D50-B5BB-9A250DAB6589" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:16.4.0:*:*:*:community:*:*:*", + "matchCriteriaId": "B5D4FDD1-7A68-4245-A4D5-842E4FD03FAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:16.4.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "6696C987-61C1-462E-8A73-016F9902BC67" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/417896", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2055158", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3920.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3920.json index 3aea3e923c5..84395369060 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3920.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3920.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3920", "sourceIdentifier": "cve@gitlab.com", "published": "2023-09-29T07:15:13.777", - "lastModified": "2023-09-29T12:45:25.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-03T15:30:56.607", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -50,14 +80,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "11.2", + "versionEndExcluding": "16.2.8", + "matchCriteriaId": "50E3FE26-231D-4331-9334-D17F81A13692" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "11.2", + "versionEndExcluding": "16.2.8", + "matchCriteriaId": "50445735-D0E7-456C-9879-0856BD857601" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "16.3.0", + "versionEndExcluding": "16.3.5", + "matchCriteriaId": "50271B2B-7070-4ED0-AB68-65B99D44A68A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.3.0", + "versionEndExcluding": "16.3.5", + "matchCriteriaId": "CC5696C9-592A-4D50-B5BB-9A250DAB6589" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:16.4.0:*:*:*:community:*:*:*", + "matchCriteriaId": "B5D4FDD1-7A68-4245-A4D5-842E4FD03FAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:16.4.0:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "6696C987-61C1-462E-8A73-016F9902BC67" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/417481", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2058121", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40558.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40558.json new file mode 100644 index 00000000000..8ee046a87aa --- /dev/null +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40558.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40558", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-10-03T14:15:10.983", + "lastModified": "2023-10-03T14:29:08.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in eMarket Design YouTube Video Gallery by YouTube Showcase plugin <=\u00a03.3.5 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/youtube-showcase/wordpress-video-gallery-management-plugin-3-3-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41244.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41244.json new file mode 100644 index 00000000000..04fa8b0336a --- /dev/null +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41244.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-41244", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-10-03T14:15:11.057", + "lastModified": "2023-10-03T14:29:08.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Buildfail Localize Remote Images plugin <=\u00a01.0.9 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/localize-remote-images/wordpress-localize-remote-images-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41693.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41693.json new file mode 100644 index 00000000000..d81acf4c58d --- /dev/null +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41693.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-41693", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-10-03T14:15:11.130", + "lastModified": "2023-10-03T14:29:08.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in edward_plainview MyCryptoCheckout plugin <=\u00a02.125 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/mycryptocheckout/wordpress-mycryptocheckout-plugin-2-125-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42793.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42793.json index eb314deb9c1..727c3fd1549 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42793.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42793.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42793", "sourceIdentifier": "security@jetbrains.com", "published": "2023-09-19T17:15:08.330", - "lastModified": "2023-10-02T16:15:10.173", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-10-03T15:44:06.660", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -91,15 +91,26 @@ "references": [ { "url": "http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html", - "source": "security@jetbrains.com" + "source": "security@jetbrains.com", + "tags": [ + "Exploit", + "VDB Entry" + ] }, { "url": "https://attackerkb.com/topics/1XEEEkGHzt/cve-2023-42793", - "source": "security@jetbrains.com" + "source": "security@jetbrains.com", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://blog.jetbrains.com/teamcity/2023/09/cve-2023-42793-vulnerability-post-mortem/", - "source": "security@jetbrains.com" + "source": "security@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", @@ -110,11 +121,17 @@ }, { "url": "https://www.rapid7.com/blog/post/2023/09/25/etr-cve-2023-42793-critical-authentication-bypass-in-jetbrains-teamcity-ci-cd-servers/", - "source": "security@jetbrains.com" + "source": "security@jetbrains.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.securityweek.com/recently-patched-teamcity-vulnerability-exploited-to-hack-servers/", - "source": "security@jetbrains.com" + "source": "security@jetbrains.com", + "tags": [ + "Press/Media Coverage" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4882.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4882.json new file mode 100644 index 00000000000..fd2c4978b6b --- /dev/null +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4882.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4882", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2023-10-03T15:15:40.440", + "lastModified": "2023-10-03T15:15:40.440", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "DOS vulnerability that could allow an attacker to register a new VNF (Virtual Network Function) value. This action could trigger the args_assets() function defined in the arg-log.php file, which would then execute the args-abort.c file, causing the service to crash." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-open5gs", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4883.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4883.json new file mode 100644 index 00000000000..0b3cb495225 --- /dev/null +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4883.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4883", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2023-10-03T15:15:40.520", + "lastModified": "2023-10-03T15:15:40.520", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": " Invalid pointer release vulnerability. Exploitation of this vulnerability could allow an attacker to interrupt the correct operation of the service by sending a specially crafted json string to the VNF (Virtual Network Function), and triggering the ogs_sbi_message_free function, which could cause a service outage." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-763" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-open5gs", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4884.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4884.json new file mode 100644 index 00000000000..a0cf5785f66 --- /dev/null +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4884.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4884", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2023-10-03T15:15:40.593", + "lastModified": "2023-10-03T15:15:40.593", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An attacker could send an HTTP request to an Open5GS endpoint and retrieve the information stored on the device due to the lack of Authentication." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-open5gs", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4885.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4885.json new file mode 100644 index 00000000000..4c52f86c6bf --- /dev/null +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4885.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4885", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2023-10-03T15:15:40.667", + "lastModified": "2023-10-03T15:15:40.667", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Man in the Middle vulnerability, which could allow an attacker to intercept VNF (Virtual Network Function) communications resulting in the exposure of sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-300" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-open5gs", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4886.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4886.json new file mode 100644 index 00000000000..8dcf077623a --- /dev/null +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4886.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2023-4886", + "sourceIdentifier": "secalert@redhat.com", + "published": "2023-10-03T15:15:40.737", + "lastModified": "2023-10-03T15:15:40.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2023-4886", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230135", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4929.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4929.json new file mode 100644 index 00000000000..f65560f1fe8 --- /dev/null +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4929.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4929", + "sourceIdentifier": "psirt@moxa.com", + "published": "2023-10-03T14:15:11.307", + "lastModified": "2023-10-03T14:29:08.387", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "All firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@moxa.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-354" + } + ] + } + ], + "references": [ + { + "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability", + "source": "psirt@moxa.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5223.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5223.json index bdc5273eb51..e41e4c8e31d 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5223.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5223.json @@ -2,15 +2,41 @@ "id": "CVE-2023-5223", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-27T15:19:43.490", - "lastModified": "2023-09-27T15:41:51.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-03T15:37:49.360", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in HimitZH HOJ up to 4.6-9a65e3f. This issue affects some unknown processing of the component Topic Handler. The manipulation leads to sandbox issue. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240365 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en HimitZH HOJ hasta 4.6-9a65e3f y clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del componente Topic Handler. La manipulaci\u00f3n conduce a un problema de la sandbox. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-240365." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +97,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hdoi:hcode_online_judge:4.6-9a65e3f:*:*:*:*:*:*:*", + "matchCriteriaId": "327EC2FB-1344-48E5-8AE3-989D15729510" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/payI0ad/cves/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.240365", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.240365", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 03707801e1e..01270a16e13 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-03T14:00:25.272763+00:00 +2023-10-03T16:00:25.297978+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-03T13:55:40.597000+00:00 +2023-10-03T15:57:15.073000+00:00 ``` ### Last Data Feed Release @@ -29,69 +29,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -226871 +226887 ``` ### CVEs added in the last Commit -Recently added CVEs: `34` +Recently added CVEs: `16` -* [CVE-2023-40210](CVE-2023/CVE-2023-402xx/CVE-2023-40210.json) (`2023-10-03T12:15:10.700`) -* [CVE-2023-4098](CVE-2023/CVE-2023-40xx/CVE-2023-4098.json) (`2023-10-03T12:15:10.780`) -* [CVE-2023-4099](CVE-2023/CVE-2023-40xx/CVE-2023-4099.json) (`2023-10-03T12:15:10.843`) -* [CVE-2023-4100](CVE-2023/CVE-2023-41xx/CVE-2023-4100.json) (`2023-10-03T12:15:10.910`) -* [CVE-2023-4101](CVE-2023/CVE-2023-41xx/CVE-2023-4101.json) (`2023-10-03T12:15:10.973`) -* [CVE-2023-4102](CVE-2023/CVE-2023-41xx/CVE-2023-4102.json) (`2023-10-03T12:15:11.040`) -* [CVE-2023-4103](CVE-2023/CVE-2023-41xx/CVE-2023-4103.json) (`2023-10-03T12:15:11.103`) -* [CVE-2023-5350](CVE-2023/CVE-2023-53xx/CVE-2023-5350.json) (`2023-10-03T12:15:11.173`) -* [CVE-2023-5351](CVE-2023/CVE-2023-53xx/CVE-2023-5351.json) (`2023-10-03T12:15:11.243`) -* [CVE-2023-2681](CVE-2023/CVE-2023-26xx/CVE-2023-2681.json) (`2023-10-03T13:15:09.937`) -* [CVE-2023-32669](CVE-2023/CVE-2023-326xx/CVE-2023-32669.json) (`2023-10-03T13:15:10.077`) -* [CVE-2023-32670](CVE-2023/CVE-2023-326xx/CVE-2023-32670.json) (`2023-10-03T13:15:10.147`) -* [CVE-2023-32671](CVE-2023/CVE-2023-326xx/CVE-2023-32671.json) (`2023-10-03T13:15:10.220`) -* [CVE-2023-32790](CVE-2023/CVE-2023-327xx/CVE-2023-32790.json) (`2023-10-03T13:15:10.293`) -* [CVE-2023-32791](CVE-2023/CVE-2023-327xx/CVE-2023-32791.json) (`2023-10-03T13:15:10.370`) -* [CVE-2023-32792](CVE-2023/CVE-2023-327xx/CVE-2023-32792.json) (`2023-10-03T13:15:10.443`) -* [CVE-2023-39159](CVE-2023/CVE-2023-391xx/CVE-2023-39159.json) (`2023-10-03T13:15:10.520`) -* [CVE-2023-40009](CVE-2023/CVE-2023-400xx/CVE-2023-40009.json) (`2023-10-03T13:15:10.597`) -* [CVE-2023-40198](CVE-2023/CVE-2023-401xx/CVE-2023-40198.json) (`2023-10-03T13:15:10.673`) -* [CVE-2023-40199](CVE-2023/CVE-2023-401xx/CVE-2023-40199.json) (`2023-10-03T13:15:10.750`) -* [CVE-2023-40201](CVE-2023/CVE-2023-402xx/CVE-2023-40201.json) (`2023-10-03T13:15:10.833`) -* [CVE-2023-40202](CVE-2023/CVE-2023-402xx/CVE-2023-40202.json) (`2023-10-03T13:15:10.907`) -* [CVE-2023-40212](CVE-2023/CVE-2023-402xx/CVE-2023-40212.json) (`2023-10-03T13:15:10.980`) -* [CVE-2023-42508](CVE-2023/CVE-2023-425xx/CVE-2023-42508.json) (`2023-10-03T13:15:11.057`) -* [CVE-2023-5353](CVE-2023/CVE-2023-53xx/CVE-2023-5353.json) (`2023-10-03T13:15:11.143`) +* [CVE-2023-0506](CVE-2023/CVE-2023-05xx/CVE-2023-0506.json) (`2023-10-03T14:15:10.473`) +* [CVE-2023-27435](CVE-2023/CVE-2023-274xx/CVE-2023-27435.json) (`2023-10-03T14:15:10.557`) +* [CVE-2023-2544](CVE-2023/CVE-2023-25xx/CVE-2023-2544.json) (`2023-10-03T14:15:10.637`) +* [CVE-2023-32091](CVE-2023/CVE-2023-320xx/CVE-2023-32091.json) (`2023-10-03T14:15:10.703`) +* [CVE-2023-39158](CVE-2023/CVE-2023-391xx/CVE-2023-39158.json) (`2023-10-03T14:15:10.777`) +* [CVE-2023-3349](CVE-2023/CVE-2023-33xx/CVE-2023-3349.json) (`2023-10-03T14:15:10.853`) +* [CVE-2023-3350](CVE-2023/CVE-2023-33xx/CVE-2023-3350.json) (`2023-10-03T14:15:10.927`) +* [CVE-2023-40558](CVE-2023/CVE-2023-405xx/CVE-2023-40558.json) (`2023-10-03T14:15:10.983`) +* [CVE-2023-41244](CVE-2023/CVE-2023-412xx/CVE-2023-41244.json) (`2023-10-03T14:15:11.057`) +* [CVE-2023-41693](CVE-2023/CVE-2023-416xx/CVE-2023-41693.json) (`2023-10-03T14:15:11.130`) +* [CVE-2023-4929](CVE-2023/CVE-2023-49xx/CVE-2023-4929.json) (`2023-10-03T14:15:11.307`) +* [CVE-2023-4882](CVE-2023/CVE-2023-48xx/CVE-2023-4882.json) (`2023-10-03T15:15:40.440`) +* [CVE-2023-4883](CVE-2023/CVE-2023-48xx/CVE-2023-4883.json) (`2023-10-03T15:15:40.520`) +* [CVE-2023-4884](CVE-2023/CVE-2023-48xx/CVE-2023-4884.json) (`2023-10-03T15:15:40.593`) +* [CVE-2023-4885](CVE-2023/CVE-2023-48xx/CVE-2023-4885.json) (`2023-10-03T15:15:40.667`) +* [CVE-2023-4886](CVE-2023/CVE-2023-48xx/CVE-2023-4886.json) (`2023-10-03T15:15:40.737`) ### CVEs modified in the last Commit -Recently modified CVEs: `97` +Recently modified CVEs: `122` -* [CVE-2023-3335](CVE-2023/CVE-2023-33xx/CVE-2023-3335.json) (`2023-10-03T12:51:52.930`) -* [CVE-2023-3440](CVE-2023/CVE-2023-34xx/CVE-2023-3440.json) (`2023-10-03T12:51:52.930`) -* [CVE-2023-3967](CVE-2023/CVE-2023-39xx/CVE-2023-3967.json) (`2023-10-03T12:51:52.930`) -* [CVE-2023-5334](CVE-2023/CVE-2023-53xx/CVE-2023-5334.json) (`2023-10-03T12:51:52.930`) -* [CVE-2023-5345](CVE-2023/CVE-2023-53xx/CVE-2023-5345.json) (`2023-10-03T12:51:52.930`) -* [CVE-2023-26150](CVE-2023/CVE-2023-261xx/CVE-2023-26150.json) (`2023-10-03T12:51:52.930`) -* [CVE-2023-26151](CVE-2023/CVE-2023-261xx/CVE-2023-26151.json) (`2023-10-03T12:51:52.930`) -* [CVE-2023-26152](CVE-2023/CVE-2023-261xx/CVE-2023-26152.json) (`2023-10-03T12:51:52.930`) -* [CVE-2023-43267](CVE-2023/CVE-2023-432xx/CVE-2023-43267.json) (`2023-10-03T12:52:01.580`) -* [CVE-2023-43268](CVE-2023/CVE-2023-432xx/CVE-2023-43268.json) (`2023-10-03T12:52:01.580`) -* [CVE-2023-43297](CVE-2023/CVE-2023-432xx/CVE-2023-43297.json) (`2023-10-03T12:52:01.580`) -* [CVE-2023-43361](CVE-2023/CVE-2023-433xx/CVE-2023-43361.json) (`2023-10-03T12:52:01.580`) -* [CVE-2023-43836](CVE-2023/CVE-2023-438xx/CVE-2023-43836.json) (`2023-10-03T12:52:01.580`) -* [CVE-2023-44008](CVE-2023/CVE-2023-440xx/CVE-2023-44008.json) (`2023-10-03T12:52:01.580`) -* [CVE-2023-44009](CVE-2023/CVE-2023-440xx/CVE-2023-44009.json) (`2023-10-03T12:52:01.580`) -* [CVE-2023-43891](CVE-2023/CVE-2023-438xx/CVE-2023-43891.json) (`2023-10-03T12:52:01.580`) -* [CVE-2023-43892](CVE-2023/CVE-2023-438xx/CVE-2023-43892.json) (`2023-10-03T12:52:01.580`) -* [CVE-2023-43893](CVE-2023/CVE-2023-438xx/CVE-2023-43893.json) (`2023-10-03T12:52:01.580`) -* [CVE-2023-44011](CVE-2023/CVE-2023-440xx/CVE-2023-44011.json) (`2023-10-03T12:52:01.580`) -* [CVE-2023-44012](CVE-2023/CVE-2023-440xx/CVE-2023-44012.json) (`2023-10-03T12:52:01.580`) -* [CVE-2023-44266](CVE-2023/CVE-2023-442xx/CVE-2023-44266.json) (`2023-10-03T12:52:30.313`) -* [CVE-2023-44265](CVE-2023/CVE-2023-442xx/CVE-2023-44265.json) (`2023-10-03T12:52:36.120`) -* [CVE-2023-44264](CVE-2023/CVE-2023-442xx/CVE-2023-44264.json) (`2023-10-03T12:52:49.740`) -* [CVE-2023-44242](CVE-2023/CVE-2023-442xx/CVE-2023-44242.json) (`2023-10-03T12:52:57.010`) -* [CVE-2023-20115](CVE-2023/CVE-2023-201xx/CVE-2023-20115.json) (`2023-10-03T13:50:23.617`) +* [CVE-2023-26145](CVE-2023/CVE-2023-261xx/CVE-2023-26145.json) (`2023-10-03T15:26:34.943`) +* [CVE-2023-3396](CVE-2023/CVE-2023-33xx/CVE-2023-3396.json) (`2023-10-03T15:27:07.463`) +* [CVE-2023-3920](CVE-2023/CVE-2023-39xx/CVE-2023-3920.json) (`2023-10-03T15:30:56.607`) +* [CVE-2023-3914](CVE-2023/CVE-2023-39xx/CVE-2023-3914.json) (`2023-10-03T15:31:20.073`) +* [CVE-2023-5223](CVE-2023/CVE-2023-52xx/CVE-2023-5223.json) (`2023-10-03T15:37:49.360`) +* [CVE-2023-34257](CVE-2023/CVE-2023-342xx/CVE-2023-34257.json) (`2023-10-03T15:38:43.973`) +* [CVE-2023-3644](CVE-2023/CVE-2023-36xx/CVE-2023-3644.json) (`2023-10-03T15:40:37.310`) +* [CVE-2023-42793](CVE-2023/CVE-2023-427xx/CVE-2023-42793.json) (`2023-10-03T15:44:06.660`) +* [CVE-2023-34468](CVE-2023/CVE-2023-344xx/CVE-2023-34468.json) (`2023-10-03T15:44:19.453`) +* [CVE-2023-3446](CVE-2023/CVE-2023-34xx/CVE-2023-3446.json) (`2023-10-03T15:48:00.240`) +* [CVE-2023-36658](CVE-2023/CVE-2023-366xx/CVE-2023-36658.json) (`2023-10-03T15:48:36.427`) +* [CVE-2023-39010](CVE-2023/CVE-2023-390xx/CVE-2023-39010.json) (`2023-10-03T15:48:47.203`) +* [CVE-2023-2344](CVE-2023/CVE-2023-23xx/CVE-2023-2344.json) (`2023-10-03T15:48:54.623`) +* [CVE-2023-2346](CVE-2023/CVE-2023-23xx/CVE-2023-2346.json) (`2023-10-03T15:48:58.363`) +* [CVE-2023-2348](CVE-2023/CVE-2023-23xx/CVE-2023-2348.json) (`2023-10-03T15:49:02.083`) +* [CVE-2023-2350](CVE-2023/CVE-2023-23xx/CVE-2023-2350.json) (`2023-10-03T15:49:05.157`) +* [CVE-2023-3119](CVE-2023/CVE-2023-31xx/CVE-2023-3119.json) (`2023-10-03T15:49:09.827`) +* [CVE-2023-34581](CVE-2023/CVE-2023-345xx/CVE-2023-34581.json) (`2023-10-03T15:49:13.333`) +* [CVE-2023-2345](CVE-2023/CVE-2023-23xx/CVE-2023-2345.json) (`2023-10-03T15:49:16.837`) +* [CVE-2023-2347](CVE-2023/CVE-2023-23xx/CVE-2023-2347.json) (`2023-10-03T15:49:20.097`) +* [CVE-2023-2349](CVE-2023/CVE-2023-23xx/CVE-2023-2349.json) (`2023-10-03T15:49:23.127`) +* [CVE-2023-2769](CVE-2023/CVE-2023-27xx/CVE-2023-2769.json) (`2023-10-03T15:49:26.707`) +* [CVE-2023-3120](CVE-2023/CVE-2023-31xx/CVE-2023-3120.json) (`2023-10-03T15:49:30.513`) +* [CVE-2023-20034](CVE-2023/CVE-2023-200xx/CVE-2023-20034.json) (`2023-10-03T15:52:00.450`) +* [CVE-2023-32477](CVE-2023/CVE-2023-324xx/CVE-2023-32477.json) (`2023-10-03T15:57:15.073`) ## Download and Usage