diff --git a/CVE-2015/CVE-2015-31xx/CVE-2015-3183.json b/CVE-2015/CVE-2015-31xx/CVE-2015-3183.json index 6924b75eb1c..bee72ccb738 100644 --- a/CVE-2015/CVE-2015-31xx/CVE-2015-3183.json +++ b/CVE-2015/CVE-2015-31xx/CVE-2015-3183.json @@ -2,8 +2,8 @@ "id": "CVE-2015-3183", "sourceIdentifier": "secalert@redhat.com", "published": "2015-07-20T23:59:02.877", - "lastModified": "2023-11-07T02:25:30.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-14T14:06:55.763", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,8 +67,16 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.4.13", - "matchCriteriaId": "C6A2E38C-9D0B-4973-A314-E5928B41D702" + "versionStartIncluding": "2.2.0", + "versionEndExcluding": "2.2.31", + "matchCriteriaId": "FADCA439-D2D8-4329-AD6E-BDA215BF6EB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.4.0", + "versionEndExcluding": "2.4.16", + "matchCriteriaId": "42D9DB2C-AA6E-4633-AB01-7E551E36E912" } ] } @@ -85,211 +93,378 @@ }, { "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=144493176821532&w=2", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2015-1666.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2015-1667.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2015-1668.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2015-2661.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-0061.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-2054.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-2055.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2016-2056.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.apache.org/dist/httpd/CHANGES_2.4", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.debian.org/security/2015/dsa-3325", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] }, { "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/75963", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/91787", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id/1032967", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2686-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2015:2659", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2015:2660", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/apache/httpd/commit/a6027e56924bb6227c1fdbf6f91e7e2438338be6", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/apache/httpd/commit/e427c41257957b57036d5a549b260b6185d1dd73", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://puppet.com/security/cve/CVE-2015-3183", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/201610-02", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT205219", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://support.apple.com/kb/HT205031", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-89xx/CVE-2015-8963.json b/CVE-2015/CVE-2015-89xx/CVE-2015-8963.json index 65a1a4eee4f..8b9150f11ac 100644 --- a/CVE-2015/CVE-2015-89xx/CVE-2015-8963.json +++ b/CVE-2015/CVE-2015-89xx/CVE-2015-8963.json @@ -2,8 +2,8 @@ "id": "CVE-2015-8963", "sourceIdentifier": "security@android.com", "published": "2016-11-16T05:59:02.890", - "lastModified": "2016-11-28T19:50:54.427", - "vulnStatus": "Modified", + "lastModified": "2023-12-14T14:06:01.427", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -89,8 +89,29 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "4.3.6", - "matchCriteriaId": "2B389602-4271-4CF2-BA64-4B0DAD8AB4A9" + "versionEndExcluding": "3.2.85", + "matchCriteriaId": "9A5A178A-A60C-4053-AEE0-5164430206AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "3.16.40", + "matchCriteriaId": "6C5B0F97-B38C-412B-93E9-148AC6F6B58E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.17", + "versionEndExcluding": "3.18.54", + "matchCriteriaId": "56806170-9BCD-4160-A14A-558EFAB98EC8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.19", + "versionEndExcluding": "4.4", + "matchCriteriaId": "2E5A3570-BCD5-4B21-89DF-F509EBA1A032" } ] } @@ -103,6 +124,7 @@ "source": "security@android.com", "tags": [ "Patch", + "Third Party Advisory", "Vendor Advisory" ] }, @@ -115,7 +137,11 @@ }, { "url": "http://www.securityfocus.com/bid/94207", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373", diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43843.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43843.json index 17d4d2bfcf1..b66f48240ae 100644 --- a/CVE-2022/CVE-2022-438xx/CVE-2022-43843.json +++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43843.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43843", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-14T01:15:07.453", - "lastModified": "2023-12-14T01:15:07.453", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0757.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0757.json new file mode 100644 index 00000000000..04350f42aed --- /dev/null +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0757.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-0757", + "sourceIdentifier": "info@cert.vde.com", + "published": "2023-12-14T14:15:42.083", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to upload arbitrary malicious code and gain full access on the affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://cert.vde.com/en/advisories/VDE-2023-051/", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1904.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1904.json index 0dd62369965..706db0aa9ff 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1904.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1904.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1904", "sourceIdentifier": "security@octopus.com", "published": "2023-12-14T08:15:36.550", - "lastModified": "2023-12-14T08:15:36.550", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21751.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21751.json index 09dc5bade7f..7532f637fec 100644 --- a/CVE-2023/CVE-2023-217xx/CVE-2023-21751.json +++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21751.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21751", "sourceIdentifier": "secure@microsoft.com", "published": "2023-12-14T00:15:42.863", - "lastModified": "2023-12-14T00:15:42.863", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25642.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25642.json index 37f994e43a2..d5af6bbaeab 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25642.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25642.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25642", "sourceIdentifier": "psirt@zte.com.cn", "published": "2023-12-14T08:15:37.717", - "lastModified": "2023-12-14T08:15:37.717", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25643.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25643.json index 5c0bfb84575..3fb68539a75 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25643.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25643.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25643", "sourceIdentifier": "psirt@zte.com.cn", "published": "2023-12-14T08:15:38.357", - "lastModified": "2023-12-14T08:15:38.357", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25644.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25644.json index c431e2a4a15..beb54cf9926 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25644.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25644.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25644", "sourceIdentifier": "psirt@zte.com.cn", "published": "2023-12-14T08:15:38.997", - "lastModified": "2023-12-14T08:15:38.997", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25648.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25648.json index 3a6a7e852dd..a32dd3f478f 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25648.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25648.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25648", "sourceIdentifier": "psirt@zte.com.cn", "published": "2023-12-14T07:15:07.180", - "lastModified": "2023-12-14T07:15:07.180", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25650.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25650.json index 8c851d3d1a7..d7008d34e00 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25650.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25650.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25650", "sourceIdentifier": "psirt@zte.com.cn", "published": "2023-12-14T07:15:07.783", - "lastModified": "2023-12-14T07:15:07.783", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25651.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25651.json index 48d483a077e..2572d36f771 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25651.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25651.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25651", "sourceIdentifier": "psirt@zte.com.cn", "published": "2023-12-14T07:15:08.270", - "lastModified": "2023-12-14T07:15:08.270", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31546.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31546.json index 2200f79c873..aeb4921ea57 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31546.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31546.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31546", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T01:15:07.850", - "lastModified": "2023-12-14T01:15:07.850", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32460.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32460.json index 092de46fa20..aaf6c02e718 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32460.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32460.json @@ -2,16 +2,40 @@ "id": "CVE-2023-32460", "sourceIdentifier": "security_alert@emc.com", "published": "2023-12-08T06:15:45.427", - "lastModified": "2023-12-08T14:23:10.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-14T14:48:51.007", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\nDell PowerEdge BIOS contains an improper privilege management security vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to privilege escalation.\n\n" + }, + { + "lang": "es", + "value": "Dell PowerEdge BIOS contiene una vulnerabilidad de seguridad de administraci\u00f3n de privilegios inadecuada. Un atacante local no autenticado podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una escalada de privilegios." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -46,10 +80,3543 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r660_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "CAC1D044-C214-4ACE-A4B7-D969C4E39BC6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86AC134C-EFB7-46B8-B60F-5BD2663D7168" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r760_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "455904B1-B7A3-41E3-B76F-E55F621FA713" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89E8485C-4298-4DA0-95AD-50C21BC2C798" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_c6620_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "4D00800C-1C21-4426-B862-615C5943AC43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_c6620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D360EB7D-5AB4-483C-BF00-53473B2D8AF4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_mx760c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "72272227-F1F7-4281-A45E-EAF38A98F6D9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_mx760c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2670A942-4200-46F2-A4FC-6D2F0E2074B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r860_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "54369267-A066-437A-B6B6-4286EBA8633B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r860:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B53D6488-A6E3-4505-8093-8232DC4219BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r960_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "4298A5CB-503B-4650-B8AB-C74A2A571056" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5B42153-ED7B-433A-9070-9CAC972322BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_hs5610_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "59F7FAEC-7E06-4BED-9593-9DA927CC0DEC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_hs5610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08A9C14A-7D1A-4724-BBBD-62FC4C66FCE1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_hs5620_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "326FECA8-4534-4296-97F8-0142A056CEBA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_hs5620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "447BE381-9C9B-4339-B308-71D90DB60294" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r660xs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "861C9493-04D9-4B0E-99EF-63C362A4ABD2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r660xs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17FF7F29-F169-49B5-BEBA-6F20E3CDF1E6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r760xs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "F15C3D36-575A-4137-BA5F-2EBC41A282E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r760xs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3364A3E-BA9B-4588-89E5-A2C6C17B5D97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r760xd2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "2151C4BF-EDE5-4971-A286-BEDFA8F87E28" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r760xd2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B21CBCD8-266A-4BCD-933D-2EF5F479B119" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_t560_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "8785176F-66AC-46B7-83FA-27E7F226EA75" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_t560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4A86D53-1352-48FB-A26A-C898B2C6425E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r760xa_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "7BA1CBD1-3507-4889-9E34-1D3CEC551F9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r760xa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62603619-611F-4343-B75E-D45C50D1EA2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xr5610_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "57EC977C-0AD6-461B-A809-4F653A4878F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xr5610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "788BF4F3-2AA4-4DF5-A829-66891BBB219D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xr8610t_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "685B69D4-BC30-4DDC-84A3-1B1E3C65EDE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xr8610t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E371B4A2-52F2-4282-BDBC-C1517798A540" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xr8620t_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "08D5B85A-DBAD-4539-B8AF-5B5271C09BCE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xr8620t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6E850B8-521D-4E3E-8179-1202BE9EC62E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r6615_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "7D3DAA7B-23C2-4419-B952-610031FEEDD8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r6615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73077527-E12D-495C-AB91-C35109AE4C43" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r7615_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "A0DC02E0-E2B0-4F97-A9B8-C9D4F0971E0B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r7615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A74500E4-ADD2-4134-8D60-F4285C158F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xr7620_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "B2F1ED00-4162-4E8B-9FD2-C808BFCF0DFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xr7620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD309417-5B3B-4FB1-BDD6-5EAC8E21B3B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xe8640_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.6", + "matchCriteriaId": "9917917B-3479-42A8-BFB4-3D5B74997166" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xe8640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "990D292B-17A2-420A-A64A-EB436162FF31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xe9640_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.6", + "matchCriteriaId": "54A3D7B9-44C3-4162-B60D-2AEE0B495FE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xe9640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25CCFD10-C62A-4549-B389-ABBD44E9EE64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xe9680_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.6", + "matchCriteriaId": "9A021A19-A416-493E-B922-F60265FAF8AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xe9680:-:*:*:*:*:*:*:*", + "matchCriteriaId": "636676E8-9ECA-48B2-976A-7173CDEB026D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r6625_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.8", + "matchCriteriaId": "D17CDE09-0AE2-4082-8E6B-E0488A8C2DF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r6625:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09981777-C86C-4BC6-8834-97E8A2551897" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r7625_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.8", + "matchCriteriaId": "30FE2455-8D61-424A-A6CA-1AB7A6E18FA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r7625:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F074158-252A-4C51-B80C-1B94E22A364A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_c6615_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.2", + "matchCriteriaId": "E379DDB9-CF28-4EDB-A4A9-B6A31D716DFF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_c6615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "788C678A-92CF-45BD-99D5-AF18394C9860" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r650_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "7524BFD6-AED5-4451-AB28-64E6FC5F010C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18C87CDE-E138-4709-91B9-0111B18313C6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r750_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "0D90FED6-00BB-41AF-981C-4C6B6A5052BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "804EDA15-E6C0-4D51-BC53-FCE71FA7B591" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r750xa_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "1EF539F0-43EA-4A0E-B307-4272DB7AAE9B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r750xa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F5378D9-A940-40AD-9E16-90107855840B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_c6520_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "5F596B3D-7C8D-4F21-AC99-0ECF9F3D2D14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_c6520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9D48343-BB79-4204-B521-89E0C0EECA54" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_mx750c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "DECF62C4-41CD-4713-B0E0-D97CE91210A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_mx750c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7173B68-FD26-4414-9CEE-A8B7EA4729BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r550_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "8BD035C8-AA91-4296-B965-B37FC03122E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EFF840F-D2E6-42D3-8590-FE5C0960442D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r450_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "11F1C359-EB77-4781-8379-05CDA6673176" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E29D0AE9-FB8F-4FCA-9D5B-4987312AB9FA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r650xs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "8B15C1C8-8B54-4D9A-94F7-7A84BB50F505" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r650xs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "496FC5E6-B5A5-4054-ACE0-893E56B22F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r750xs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "B601C38F-C29F-4212-B4B9-EB7A94A0588E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r750xs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EAF00878-2C77-4703-BF06-7CEC413374E3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_t550_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "5188887B-58C8-4BC2-BA80-AA0F55B0E884" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_t550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3FCB14D-D874-4E6A-ABAA-74786AE6F715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xr11_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "9E582144-6F55-4B77-83AC-8631BCA29A11" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xr11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37025301-D1A0-45D2-B07B-6D71D79D8160" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xr12_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "77884F68-FB28-4D16-B71D-AFD64BB95AD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xr12:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BD39D46-D556-474D-A59C-A4400A43A172" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_t150_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.1", + "matchCriteriaId": "D6504363-EE36-47BB-84AB-04F6A05B0706" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_t150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8EEF28D5-BCD8-4DF8-9635-9520B621F69D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_t350_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.1", + "matchCriteriaId": "B91588C8-1B2F-4B4B-9C4E-95C20096F765" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_t350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C23BA8A-49F1-4BF4-B4B6-8C0D1B9E3A96" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r250_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.1", + "matchCriteriaId": "D5969F4E-838A-43DC-A9B7-2D4A9E762B79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "979B7476-13BE-4F6A-A8F2-C4D5861EC9DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r350_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.1", + "matchCriteriaId": "F1EDD12D-3227-4D0D-9F1E-578D22A70F34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB51F224-453D-414A-ACA2-31BBABD4F6F0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xr4510c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.13.3", + "matchCriteriaId": "CA1A8E2F-10DD-4998-B68D-F319AC27D7A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xr4510c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08C108AA-0A97-4AA0-ACC7-BE6BE6C502AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xr4520c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.13.3", + "matchCriteriaId": "E40537E2-F363-4213-9C1B-361FBE6DA4FD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xr4520c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A957B9D0-14AA-4AED-9579-49B6A406ED21" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r6515_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.13.3", + "matchCriteriaId": "3D55C57A-77C1-4A5B-864A-EBBEB2B722F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r6515:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D00F86E-6591-41FA-A6E0-DC89CBE8108C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r6525_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.13.3", + "matchCriteriaId": "8B3BAD22-AEAB-4546-BE89-DE766568F61A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r6525:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EC11F70-7D34-431C-93D3-F37B664FCDAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r7515_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.13.3", + "matchCriteriaId": "69967643-07F3-4D95-9901-019105CD49B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r7515:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9D7E374-38A9-4163-8385-8D8EB682A582" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r7525_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.13.3", + "matchCriteriaId": "ED7CC5AA-6BCC-4BD8-9CF8-21123DA329F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r7525:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9CDF7A1-8BF1-4020-94EC-FFEDC663386B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_c6525_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.13.3", + "matchCriteriaId": "369719D8-E99D-47EF-BFD3-96A92D58826D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_c6525:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65B387A6-EFA5-4711-ACE7-45436426059A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xe8545_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.13.3", + "matchCriteriaId": "939024E5-DCE1-4F54-B226-90F9759FA6B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xe8545:-:*:*:*:*:*:*:*", + "matchCriteriaId": "418E58B7-33BF-4332-ABE7-2475747624C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r740_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "D98D731A-3950-4279-A63E-A2CD6A7063DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE562535-3D9B-4A82-AC0D-6A2225E63E8D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r640_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "DA5290BF-A3FB-4035-9148-46D66AC2C835" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81416C16-D7FA-4165-BB0E-6458A4EA5AEE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r940_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "E6BDF269-EEC3-47A7-A824-93D0CB915473" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r940:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B581E1DE-4E94-49E5-B5CF-2A94B2570708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r540_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "8AFCEDF9-936F-4A37-AE20-68C705728854" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73B27F54-3CE3-4A5F-BBA1-2C6ED5316B47" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r440_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "A735CB99-56D5-4CD7-9543-6AE947A8EB7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r440:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBC3957E-791A-4052-A9C4-F3ECBD746E37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_t440_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "4770F9CF-ADAA-4048-A1A5-A06E1E4AE2C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_t440:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28F97F1A-B41E-4CC5-B668-8C194CE2C29E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xr2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "1C8FDF66-FAB7-43EC-A00F-D2F7BE208B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xr2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88EC4390-C39F-4E56-9631-B8A22986690D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r840_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "06D37EA7-693C-4F87-B0B6-DBE4769F69F7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E058B9C6-CD1C-42F5-8781-05450254E9E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_t640_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "0031CA99-76C0-42A7-B0EC-0B9A815DD5A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_t640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DEC0235-DDA1-4EE4-B3F8-512F1B29AFC6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_c6420_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "77608589-52B4-4358-A8A4-C32601E8901B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_c6420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "027D86DE-076F-4CE9-9DE9-E6976C655E8F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_fc640_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "7958FB05-8940-4F62-94EA-6626DC373963" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_fc640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9C59D4B-1122-4782-A686-559E7DF8C3C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_m640_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "DD109FE6-F05C-44B8-86E2-5939CA7C52E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_m640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F8B50A1-577F-451E-8D03-C8A6A78000DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_c4140_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "9C7D6956-DF48-45CC-956D-2507FA1556F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_c4140:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9ACC9B8-C046-4304-BA58-7D6D7945BE95" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_mx740c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "18E7E17B-2C69-42CE-B73F-F85E1DDAFE35" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_mx740c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "757039D5-60B9-40B0-B719-38E27409BDDE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_mx840c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "B73A91F7-3271-4507-A76D-25A3E3E20168" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_mx840c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4305D0F-CB59-49D5-8D21-8ECC3342C36C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r740xd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "E9636D81-B033-4A3C-9F9A-5CE0AA22A175" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r740xd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "868ECD3F-77CD-4F5D-86E5-61689E4C5BA0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r740xd2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "60564058-0015-4BBC-8B8C-459B9FC43446" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r740xd2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5395D3F-58D4-49F9-AA2F-0D5C6D8C4651" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r940xa_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "AD4D0041-8F4E-4FA4-BC8C-D2F9C21F3A88" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r940xa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D143853-3D62-4AD7-B899-F726036A34D2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xe2420_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.0", + "matchCriteriaId": "91AD7660-E855-4F55-A049-FB727F82A826" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xe2420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "30D12E41-8F03-435C-B137-CD3465923E5C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xe7420_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.0", + "matchCriteriaId": "E29EE809-1DCE-474B-982C-4CFCD0794371" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xe7420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB402EFE-DEFF-40D1-B1C8-8A7D6923669E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_xe7440_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.0", + "matchCriteriaId": "91D105A9-1525-4C2C-9ACB-A973048E0BAC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_xe7440:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB265071-7294-4317-A854-0D90844CDC17" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_t140_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.15.1", + "matchCriteriaId": "33A15C6B-5DC5-4881-884A-ED891D8D5B63" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_t140:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E2E7999-9125-4915-8AA3-A3A7F09C5B83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_t340_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.15.1", + "matchCriteriaId": "0B5D9C73-EF4C-4B26-8DDE-2E91F8D1E800" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_t340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3AF6A5D-6297-4640-9693-51770B5A4B3A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r240_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.15.1", + "matchCriteriaId": "96D7A70E-5D50-4EDC-A5D8-E084EC020CDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA8A110-B800-4DA1-B87E-50F925780746" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r340_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.15.1", + "matchCriteriaId": "2C8B6DCF-4DD5-4BAB-BD66-B80125A7500A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3335BF65-71A1-4045-902B-CD5C69336D8A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r6415_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.21.0", + "matchCriteriaId": "DF0CB761-3729-4FE2-873F-D041FF22AC7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r6415:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22059909-792A-4D78-B626-584608398A8B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r7415_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.21.0", + "matchCriteriaId": "7F0E4094-8F39-4415-9785-CA248ACDF0E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r7415:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3BC6AF0A-A077-4D94-AE94-D5189355AF3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r7425_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.21.0", + "matchCriteriaId": "21514D06-11FA-4981-A145-FB5B3CEAAE9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r7425:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DEC88086-855D-4378-9DB6-3E89D3275A01" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r930_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.13.0", + "matchCriteriaId": "150E7E7B-D10A-4685-BA87-B1EFD2892380" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r930:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1669BF88-F4AC-4166-B657-A5E0EB95F206" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r730_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "7F23D6B8-CF4F-4955-B2F7-CDE23CB275F5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r730:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F2D8095-BFAD-4A4C-92EF-5C27AC5860FC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r730xd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "518769F6-CF15-48D1-BCE3-F6B2F86D8D14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r730xd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20FC968-9159-4514-9001-B6E14AAC9BB4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r630_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "9AAB5E19-CDE6-4AAD-9275-80A52658FA57" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r630:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3889B4D3-0B99-44AC-B732-809F7652C9D2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_c4130_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "FC44C9C8-4AF5-4570-8526-A603D3190215" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_c4130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89E0CC72-B046-4F7C-B7FD-E8E0995C0333" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_m630_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "56B1B7E6-AC74-42B5-9CDD-22EBE6F79C5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_m630:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05ABA114-D098-48D2-9E0F-E021D82F08B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_fc630_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "CC4E56B5-1421-470A-B558-B13666A2C95D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_fc630:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E5481DE-457C-44D4-A3FE-10DB525699E3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_fc430_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "2DFD298A-DE77-48D0-8986-6C31287ECAA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_fc430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1C272E6-7D78-433C-B668-EF0E810CC5BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_m830_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "D692F4E6-059E-40F1-968A-59C27B2EC887" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_m830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3BE9AB9-8093-437E-9BF6-8BA0D5ECC7D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_fc830_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "0CF35DC6-42AE-4F19-B3E3-759D85337BE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_fc830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C060A4FA-B524-497C-AC27-3256ED048DF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_t630_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.2", + "matchCriteriaId": "FAA229A2-7CB6-4716-B06E-0BAFFC414B43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_t630:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F2B4062-E672-4F04-AA58-769DC546DA10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.2", + "matchCriteriaId": "4A7F2D87-48D0-46B0-9801-88F8AB0A70EE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1ECA70D5-0884-4B74-92C0-DFBC8454FDAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r430_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.2", + "matchCriteriaId": "71031E90-8FF5-45B2-AE14-5A2396128E57" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8EFF354-4534-480D-B52E-5FA575659E77" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_t430_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.2", + "matchCriteriaId": "60B41F7E-55D8-444A-B235-7CAF53847070" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_t430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B326C0B3-8CDF-4451-8B59-6E6EA3F1AB76" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_c6320_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.2", + "matchCriteriaId": "7DB3EE3A-DE08-407D-A96E-3747AB4F809E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_c6320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB62B772-0492-490F-B971-93854DFD0CE0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_t130_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.19.1", + "matchCriteriaId": "ED44A834-81A2-4DDE-A862-B91664479D4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_t130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FEFCD6F-3FEB-4505-9916-F64377D070BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r230_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.19.1", + "matchCriteriaId": "28998BD5-6BCB-4633-90D4-804A3FA91614" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51598822-B949-4557-8205-C466E2CC2C6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_t330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.19.1", + "matchCriteriaId": "E4E882AF-0DC7-4F1C-AE9F-86E83DA69E1B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_t330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96FDFCC3-CEDA-4619-AA28-29D3D0688214" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.19.1", + "matchCriteriaId": "4CB02239-B3D0-47B8-91D9-487E0098254F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98D429E8-BA53-44BF-9C88-8CED370E2EF1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_r830_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.18.1", + "matchCriteriaId": "ABAD8868-8740-44D2-A1C5-8162C51A8C2E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_r830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFD80313-F625-40DE-82CC-15EBD2747991" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_m640_\\(pe_vrtx\\)_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "FC6BAF2F-4F09-4EA0-AE80-0188757CF2AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_m640_\\(pe_vrtx\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "E44662C1-D438-452B-9669-8C1F8ADBABF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_m630_\\(pe_vrtx\\)_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "70F2EB74-3011-466D-BF32-F8D44E6BA5D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_m630_\\(pe_vrtx\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "D90D2E26-AD95-4284-9007-50A60364A34C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:poweredge_m830_\\(pe_vrtx\\)_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "DA0A6758-6A0D-4EE1-88E7-E2C5D73DFBAD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:poweredge_m830_\\(pe_vrtx\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE4FDBF0-B9FE-4A7C-93B7-FF9E0E63B424" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:dss_8440_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.0", + "matchCriteriaId": "5E01365B-5654-4176-9422-0F90AAA5F552" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dss_8440:-:*:*:*:*:*:*:*", + "matchCriteriaId": "239C2103-C4BB-4C6A-8E09-C6F7D52024D3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:nx3230_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "C358D96F-0154-40AB-A369-4684542815E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:nx3230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24D0E8F8-4EEB-4A1E-B853-3704140A86B8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:nx3330_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "93393744-0A0C-47AA-87FF-7BD8889E88E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:nx3330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9428F53B-5740-4E8F-8569-ECE6CA4C137F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:nx430_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.19.1", + "matchCriteriaId": "4BA6A54A-12ED-4E9B-A5A8-C140EBB90621" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:nx430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "499C9492-AEAF-449B-A803-E16A684416B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_storage_nx3240_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "4EC31A43-809F-4221-9234-AB4F87A22B2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_storage_nx3240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFCDCB3C-4995-4211-8592-3D7F94098A26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_storage_nx3340_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "665F2F2B-3911-4F91-BE01-463BF27B3B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_storage_nx3340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66F375D2-85E4-4994-AE90-99D25A50F9AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_nx440_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.15.1", + "matchCriteriaId": "E8EEE051-B6FA-4777-8352-813AC6070496" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:nx440:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E4E3394-FEE3-4F25-963A-A687B96782AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_xc_core_xc450_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "31A59A56-9044-46E2-909B-17DC3F168E1B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_xc_core_xc450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDCE2A0C-5A87-445A-8C60-FDED123CB158" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_xc_core_xc650_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "DFF46B83-8675-4143-A843-12320D53F35E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_xc_core_xc650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "995093A7-6545-49CB-8EC9-111BDB03F22A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_xc_core_xc750_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "F668032F-8C2A-4D64-ADC7-746160CA709D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_xc_core_xc750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D993733-A9F9-493A-A681-8BE661577E20" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_xc_core_xc750xa_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "DA26366F-76CE-4439-9ED4-208C0766AF7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_xc_core_xc750xa:-:*:*:*:*:*:*:*", + "matchCriteriaId": "340C43C5-1AC5-4EEF-A302-5F31613890EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_xc_core_xc6520_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.12.1", + "matchCriteriaId": "AF06E2AE-EBF8-4354-A06D-88BFB7B83B69" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_xc_core_xc6520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E10F545-A29C-411D-AA1E-AC45F9E67696" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_xc_core_xcxr2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "2833616D-602C-4EDD-8937-56BAA7DB1E98" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_xc_core_xcxr2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FF8CC72-C32F-476D-86D3-CFF022185D76" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_xc_core_xc740xd2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "DDC293DC-C90E-431E-82E3-411D30ACFBC4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_xc_core_xc740xd2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0127228B-FBC4-4C66-AFA1-749C151F79C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_xc_core_xc7525_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.13.3", + "matchCriteriaId": "233A6D19-2145-4807-9587-FB947B1037AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_xc_core_xc7525:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA5F5A6D-1B59-464C-854E-6ECAA05E1217" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_xc_core_6420_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "51DB65B9-DA44-4D99-809F-044373D597B6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_xc_core_6420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A54DBA6D-E506-4557-8659-1707F6C9D02F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_xc_core_xc640_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "D6425705-08FC-4B2E-BB7F-C817E21EE144" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_xc_core_xc640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8EE5A591-AFD4-43B0-9383-B2F306940679" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_xc_core_xc740xd_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "B2520B96-CEF0-4DF8-93A2-8A903F9940B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_xc_core_xc740xd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AD7E6DE-4B9B-4C23-81A1-D8D52D2E4215" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:emc_xc_core_xc940_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.20.1", + "matchCriteriaId": "68C3F845-4413-4E35-AFC0-D30F8DD7E261" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:emc_xc_core_xc940:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A160D84-3C5D-4789-8AF3-B006A5956B3F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:xc_core_xc660_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "022170AF-65C3-4F62-9845-405EF34CD836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xc_core_xc660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B63C230-DCE3-4B51-814F-D2C604943DA8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:xc_core_xc760_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.6", + "matchCriteriaId": "9A7E84E1-F13C-49AD-96C1-5791E8D7FEBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xc_core_xc760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21383EAC-7D09-414F-B314-1E9F54E605B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:xc6320_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.2", + "matchCriteriaId": "27CC710D-32A8-4B8C-A022-2C30E7FCCF81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xc6320_hyperconverged_appliance:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65516802-9F50-45C0-B736-776233A29709" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:xc430_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.2", + "matchCriteriaId": "DA2E8392-8274-461A-80CA-C4342FF9F51C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xc430_hyperconverged_appliance:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBAB99EE-1539-4906-B742-7BD925A253FF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:xc630_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "CCE79037-80F3-45B4-A946-171958C9AF44" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xc630_hyperconverged_appliance:-:*:*:*:*:*:*:*", + "matchCriteriaId": "176F679F-5041-4F9D-890E-6D18E9E70245" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:xc730_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "BF63C026-73C9-434E-9FA6-6A0B1E063776" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xc730_hyperconverged_appliance:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4FAEA1B-03D8-4528-A25B-5F490D24DCB2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:xc730xd_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.18.1", + "matchCriteriaId": "454D8D4E-5F29-4917-98D1-BBC304FAF84D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xc730xd_hyperconverged_appliance:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF23CF1B-64EF-4FF2-B24D-CC8012F6FA78" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000219550/dsa-2023-361-security-update-for-dell-poweredge-server-bios-for-an-improper-privilege-management-security-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40627.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40627.json index de121dd390a..d93542059f2 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40627.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40627.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40627", "sourceIdentifier": "security@joomla.org", "published": "2023-12-14T09:15:41.397", - "lastModified": "2023-12-14T09:15:41.397", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40628.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40628.json index e291ad6c9b7..f6be63ebc67 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40628.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40628.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40628", "sourceIdentifier": "security@joomla.org", "published": "2023-12-14T09:15:41.480", - "lastModified": "2023-12-14T09:15:41.480", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40629.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40629.json index 781ec1aac81..b1cc49d7cb7 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40629.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40629.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40629", "sourceIdentifier": "security@joomla.org", "published": "2023-12-14T09:15:41.550", - "lastModified": "2023-12-14T09:15:41.550", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40630.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40630.json index 7386a901db5..94a26058c1e 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40630.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40630.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40630", "sourceIdentifier": "security@joomla.org", "published": "2023-12-14T09:15:41.630", - "lastModified": "2023-12-14T09:15:41.630", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40655.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40655.json index 3af8e431e6c..b815fccdd71 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40655.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40655.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40655", "sourceIdentifier": "security@joomla.org", "published": "2023-12-14T09:15:41.707", - "lastModified": "2023-12-14T09:15:41.707", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40656.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40656.json index 43b29c44b93..1a8eb82a9a5 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40656.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40656.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40656", "sourceIdentifier": "security@joomla.org", "published": "2023-12-14T09:15:41.780", - "lastModified": "2023-12-14T09:15:41.780", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40657.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40657.json index 7d424d36eb3..34a637a7f1b 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40657.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40657.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40657", "sourceIdentifier": "security@joomla.org", "published": "2023-12-14T09:15:41.850", - "lastModified": "2023-12-14T09:15:41.850", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40658.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40658.json index 9019bc4ce21..99201723f8d 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40658.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40658.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40658", "sourceIdentifier": "security@joomla.org", "published": "2023-12-14T09:15:41.920", - "lastModified": "2023-12-14T09:15:41.920", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40659.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40659.json index 0abb66ee460..d1de7524aaf 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40659.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40659.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40659", "sourceIdentifier": "security@joomla.org", "published": "2023-12-14T09:15:41.993", - "lastModified": "2023-12-14T09:15:41.993", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-409xx/CVE-2023-40921.json b/CVE-2023/CVE-2023-409xx/CVE-2023-40921.json index c1a9d685ce7..d31b1e68b3a 100644 --- a/CVE-2023/CVE-2023-409xx/CVE-2023-40921.json +++ b/CVE-2023/CVE-2023-409xx/CVE-2023-40921.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40921", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T00:15:43.443", - "lastModified": "2023-12-14T00:15:43.443", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41618.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41618.json index fedd577b74c..7d29e4d6af6 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41618.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41618.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41618", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T00:15:43.490", - "lastModified": "2023-12-14T00:15:43.490", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41621.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41621.json index a1a3ffbbac1..316172b1a08 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41621.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41621.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41621", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-13T23:15:07.217", - "lastModified": "2023-12-13T23:15:07.217", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41719.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41719.json index 301adf205de..0e1419c3400 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41719.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41719.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41719", "sourceIdentifier": "support@hackerone.com", "published": "2023-12-14T02:15:12.460", - "lastModified": "2023-12-14T02:15:12.460", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41720.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41720.json index 499b418b169..d23c1ebfa01 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41720.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41720.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41720", "sourceIdentifier": "support@hackerone.com", "published": "2023-12-14T02:15:12.670", - "lastModified": "2023-12-14T02:15:12.670", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42899.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42899.json index ffa88363d8e..ecc40279a95 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42899.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42899.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42899", "sourceIdentifier": "product-security@apple.com", "published": "2023-12-12T01:15:11.733", - "lastModified": "2023-12-13T03:15:47.640", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-14T14:07:42.957", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,63 +14,225 @@ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Sonoma 14.2, iOS 17.2 y iPadOS 17.2, watchOS 10.2, macOS Ventura 13.6.3, tvOS 17.2, iOS 16.7.3 y iPadOS 16.7.3, macOS Monterey 12.7.2. El procesamiento de una imagen puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.3", + "matchCriteriaId": "158A9F27-6C9F-4B9A-82EC-087E6B79E1F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.2", + "matchCriteriaId": "D0997B97-8D18-41AC-85DD-3605A5DBCA35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.3", + "matchCriteriaId": "F5968985-0FC1-4280-96AE-B0E55156B2C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.2", + "matchCriteriaId": "C6DB531C-9534-461D-87D4-C2BA2BD1D9F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0", + "versionEndExcluding": "12.7.2", + "matchCriteriaId": "DA448C81-63DE-42EB-ADCC-C3A829C6D956" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.3", + "matchCriteriaId": "E270DF97-8603-42D8-A31C-FCD89A7D2F1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.2", + "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.2", + "matchCriteriaId": "BE118A00-4F9E-496A-9408-88E2CD12339F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.2", + "matchCriteriaId": "1183933F-F52A-45A7-B118-FC8B8BDD5509" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Dec/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/11", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/12", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/13", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/7", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214034", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214035", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214036", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214037", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214038", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214040", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214041", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42900.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42900.json index 193b6df87f5..55b72f358da 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42900.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42900.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42900", "sourceIdentifier": "product-security@apple.com", "published": "2023-12-12T01:15:11.787", - "lastModified": "2023-12-13T01:15:08.770", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-14T14:55:04.343", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,77 @@ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.2. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.2", + "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Dec/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214036", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42914.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42914.json index db6302082f4..4da1b75daa0 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42914.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42914.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42914", "sourceIdentifier": "product-security@apple.com", "published": "2023-12-12T01:15:12.413", - "lastModified": "2023-12-13T03:15:47.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-14T14:54:10.347", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,63 +14,225 @@ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Sonoma 14.2, iOS 17.2 y iPadOS 17.2, watchOS 10.2, macOS Ventura 13.6.3, tvOS 17.2, iOS 16.7.3 y iPadOS 16.7.3, macOS Monterey 12.7.2. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.3", + "matchCriteriaId": "158A9F27-6C9F-4B9A-82EC-087E6B79E1F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.2", + "matchCriteriaId": "D0997B97-8D18-41AC-85DD-3605A5DBCA35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.3", + "matchCriteriaId": "F5968985-0FC1-4280-96AE-B0E55156B2C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.2", + "matchCriteriaId": "C6DB531C-9534-461D-87D4-C2BA2BD1D9F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0", + "versionEndExcluding": "12.7.2", + "matchCriteriaId": "DA448C81-63DE-42EB-ADCC-C3A829C6D956" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.3", + "matchCriteriaId": "E270DF97-8603-42D8-A31C-FCD89A7D2F1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.2", + "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.2", + "matchCriteriaId": "780F2778-8AE1-4C48-8ADF-D4B7D44C3987" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.2", + "matchCriteriaId": "1183933F-F52A-45A7-B118-FC8B8BDD5509" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Dec/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/11", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/12", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/13", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/7", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214034", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214035", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214036", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214037", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214038", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214040", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214041", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42919.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42919.json index ba29e4b011b..ae288050db1 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42919.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42919.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42919", "sourceIdentifier": "product-security@apple.com", "published": "2023-12-12T01:15:12.473", - "lastModified": "2023-12-13T03:15:47.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-14T14:08:16.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,55 +14,197 @@ "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.2, iOS 17.2 y iPadOS 17.2, watchOS 10.2, macOS Ventura 13.6.3, iOS 16.7.3 y iPadOS 16.7.3, macOS Monterey 12.7.2. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.3", + "matchCriteriaId": "158A9F27-6C9F-4B9A-82EC-087E6B79E1F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.2", + "matchCriteriaId": "D0997B97-8D18-41AC-85DD-3605A5DBCA35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.3", + "matchCriteriaId": "F5968985-0FC1-4280-96AE-B0E55156B2C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.2", + "matchCriteriaId": "C6DB531C-9534-461D-87D4-C2BA2BD1D9F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0", + "versionEndExcluding": "12.7.2", + "matchCriteriaId": "DA448C81-63DE-42EB-ADCC-C3A829C6D956" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.3", + "matchCriteriaId": "E270DF97-8603-42D8-A31C-FCD89A7D2F1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.2", + "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Dec/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/11", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/13", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/7", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214034", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214035", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214036", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214037", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214038", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214041", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42922.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42922.json index 0ec230d8262..3a6e4ff5c1d 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42922.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42922.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42922", "sourceIdentifier": "product-security@apple.com", "published": "2023-12-12T01:15:12.530", - "lastModified": "2023-12-13T01:15:09.910", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-14T14:05:30.140", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,47 +14,181 @@ "value": "Este problema se solucion\u00f3 mejorando la redacci\u00f3n de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Sonoma 14.2, iOS 17.2 y iPadOS 17.2, macOS Ventura 13.6.3, iOS 16.7.3 y iPadOS 16.7.3, macOS Monterey 12.7.2. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial de ubicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.3", + "matchCriteriaId": "158A9F27-6C9F-4B9A-82EC-087E6B79E1F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.2", + "matchCriteriaId": "D0997B97-8D18-41AC-85DD-3605A5DBCA35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.3", + "matchCriteriaId": "F5968985-0FC1-4280-96AE-B0E55156B2C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.2", + "matchCriteriaId": "C6DB531C-9534-461D-87D4-C2BA2BD1D9F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0", + "versionEndExcluding": "12.7.2", + "matchCriteriaId": "DA448C81-63DE-42EB-ADCC-C3A829C6D956" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.3", + "matchCriteriaId": "E270DF97-8603-42D8-A31C-FCD89A7D2F1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.2", + "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Dec/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/11", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/7", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214034", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214035", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214036", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214037", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214038", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43042.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43042.json index 15ba46bcfa5..99eb9d52d15 100644 --- a/CVE-2023/CVE-2023-430xx/CVE-2023-43042.json +++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43042.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43042", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-14T01:15:07.897", - "lastModified": "2023-12-14T01:15:07.897", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43583.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43583.json index 7aac3b87db6..1616bce5a0d 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43583.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43583.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43583", "sourceIdentifier": "security@zoom.us", "published": "2023-12-13T23:15:07.270", - "lastModified": "2023-12-13T23:15:07.270", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43585.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43585.json index 5b86e0906a0..171124a5bc9 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43585.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43585.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43585", "sourceIdentifier": "security@zoom.us", "published": "2023-12-13T23:15:07.463", - "lastModified": "2023-12-13T23:15:07.463", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43586.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43586.json index a384f582c4e..4b643fe22e3 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43586.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43586.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43586", "sourceIdentifier": "security@zoom.us", "published": "2023-12-13T23:15:07.660", - "lastModified": "2023-12-13T23:15:07.660", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44709.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44709.json index 361bfc999dc..938292f88e9 100644 --- a/CVE-2023/CVE-2023-447xx/CVE-2023-44709.json +++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44709.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44709", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T06:15:42.743", - "lastModified": "2023-12-14T06:15:42.743", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45166.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45166.json index 98c4802e319..b67165ba457 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45166.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45166.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45166", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-13T23:15:07.850", - "lastModified": "2023-12-13T23:15:07.850", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45170.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45170.json index 2bcc21c2aa4..f421e402dd3 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45170.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45170.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45170", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-13T23:15:08.017", - "lastModified": "2023-12-13T23:15:08.017", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45174.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45174.json index 0b30fd331ef..95ad1e74ca4 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45174.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45174.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45174", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-13T23:15:08.180", - "lastModified": "2023-12-13T23:15:08.180", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45182.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45182.json new file mode 100644 index 00000000000..bc685bd3c86 --- /dev/null +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45182.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-45182", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-14T14:15:42.333", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nIBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 is vulnerable to having its key for an encrypted password decoded. By somehow gaining access to the encrypted password, a local attacker could exploit this vulnerability to obtain the password to other systems. IBM X-Force ID: 268265.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268265", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7091942", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45184.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45184.json index 4643b36d038..60506bf58cd 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45184.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45184.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45184", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-14T02:15:12.960", - "lastModified": "2023-12-14T02:15:12.960", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45185.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45185.json new file mode 100644 index 00000000000..f10f842a931 --- /dev/null +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45185.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-45185", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-14T14:15:42.553", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 could allow an attacker to execute remote code. Due to improper authority checks the attacker could perform operations on the PC under the user's authority. IBM X-Force ID: 268273." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268273", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7091942", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45866.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45866.json index 76031cea31d..779010c45ad 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45866.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45866.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45866", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-08T06:15:45.690", - "lastModified": "2023-12-13T01:15:11.003", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-14T14:47:57.930", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,47 +14,422 @@ "value": "Bluetooth HID Hosts in BlueZ pueden permitir que un dispositivo HID con funci\u00f3n perif\u00e9rica no autenticada inicie y establezca una conexi\u00f3n cifrada y acepte informes de teclado HID, lo que potencialmente permite la inyecci\u00f3n de mensajes HID cuando no se ha producido ninguna interacci\u00f3n del usuario en la funci\u00f3n central para autorizar dicho acceso. Un ejemplo de paquete afectado es bluez 5.64-0ubuntu1 en Ubuntu 22.04LTS. NOTA: en algunos casos, una mitigaci\u00f3n CVE-2020-0556 ya habr\u00eda solucionado este problema de hosts HID Bluetooth." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "49413FF7-7910-4F74-B106-C3170612CB2A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:bluproducts:dash:3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "025AACE2-2B3F-4ACD-B187-22ED8CDF8BAF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "691FA41B-C2CE-413F-ABB1-0B22CB322807" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:google:nexus_5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25DB8689-116F-49B5-91F5-BCBA8854BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:google:pixel_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B76B2AD-52E2-41D2-82D7-557DC32E064F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:google:pixel_4a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E49FC5D-ACC7-498F-88E9-293AB276CF63" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:google:pixel_6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C27C4FD0-E67A-4D54-A00A-BDD59AAABB4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:google:pixel_7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C1347ED-56D0-4AF8-92D8-D4E427B5A1CA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:-:*:*:*", + "matchCriteriaId": "652F5027-4436-458C-84FD-7AD89B489BAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:23.10:*:*:*:*:*:*:*", + "matchCriteriaId": "602CE21C-E1A9-4407-A504-CF4E58F596F5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:16.6:*:*:*:*:*:*:*", + "matchCriteriaId": "705DA51B-6A6E-422D-9A22-0DB86836EA0C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:apple:iphone_se:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91A20702-427E-4876-9DEE-E244F39A2E79" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:12.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "15DDFC77-1ACB-4092-A1C3-623DE3CC980C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:apple:macbook_air:2017:*:*:*:*:*:*:*", + "matchCriteriaId": "B649B9E4-91D9-4712-8E2A-9246E17D19CB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:13.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "CECFF66D-DDF3-4492-85BE-79B57E7AAE9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:apple:macbook_pro:m2:*:*:*:*:*:*:*", + "matchCriteriaId": "F1C6A9E0-6DDD-4E64-97B0-47C69A865C0E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.2", + "matchCriteriaId": "ED754E44-EDCF-4B0F-B662-E4C2687B4920" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.2", + "matchCriteriaId": "00FC779B-E45C-4B34-976F-490C38C22C67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.2", + "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD" + } + ] + } + ] + } + ], "references": [ { "url": "http://changelogs.ubuntu.com/changelogs/pool/main/b/bluez/bluez_5.64-0ubuntu1/changelog", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://bluetooth.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/profiles/input?id=25a471a83e02e1effb15d5a488b3f0085eaeb675", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://github.com/skysafe/reblog/tree/main/cve-2023-45866", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77YQQS5FXPYE6WBBZO3REFIRAUJHERFA/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2N2P5LMP3V7IJONALV2KOFL4NUU23CJ/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/kb/HT214035", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214036", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46141.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46141.json new file mode 100644 index 00000000000..c6d82f4b29d --- /dev/null +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46141.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-46141", + "sourceIdentifier": "info@cert.vde.com", + "published": "2023-12-14T14:15:42.767", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Permission Assignment for Critical Resource vulnerability in multiple products of the PHOENIX CONTACT classic line allow an remote unauthenticated attacker to gain full access of the affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://cert.vde.com/en/advisories/VDE-2023-055/", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46142.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46142.json new file mode 100644 index 00000000000..e980fa837b3 --- /dev/null +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46142.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-46142", + "sourceIdentifier": "info@cert.vde.com", + "published": "2023-12-14T14:15:42.983", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A incorrect permission assignment for critical resource vulnerability in PLCnext products allows an remote attacker with low privileges to gain full access on the affected devices." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://https://cert.vde.com/en/advisories/VDE-2023-056/", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46143.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46143.json new file mode 100644 index 00000000000..d16c3a5cc24 --- /dev/null +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46143.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-46143", + "sourceIdentifier": "info@cert.vde.com", + "published": "2023-12-14T14:15:43.207", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], + "references": [ + { + "url": "https://cert.vde.com/en/advisories/VDE-2023-057/", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46144.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46144.json new file mode 100644 index 00000000000..e5c971ad7ad --- /dev/null +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46144.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-46144", + "sourceIdentifier": "info@cert.vde.com", + "published": "2023-12-14T14:15:43.447", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A download of code without integrity check vulnerability in PLCnext products allows an remote attacker with low privileges to compromise integrity on the affected engineering station and the connected devices." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], + "references": [ + { + "url": "https://https://cert.vde.com/en/advisories/VDE-2023-056/", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46348.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46348.json index 1058e6d5ba0..b2e02b0d732 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46348.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46348.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46348", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T09:15:42.060", - "lastModified": "2023-12-14T09:15:42.060", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46750.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46750.json index 80f070f1931..c17f6bad2e8 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46750.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46750.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46750", "sourceIdentifier": "security@apache.org", "published": "2023-12-14T09:15:42.107", - "lastModified": "2023-12-14T09:15:42.107", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47620.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47620.json index 20a29f12e31..9c4351101c1 100644 --- a/CVE-2023/CVE-2023-476xx/CVE-2023-47620.json +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47620.json @@ -2,12 +2,16 @@ "id": "CVE-2023-47620", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-13T22:15:43.197", - "lastModified": "2023-12-13T22:15:43.197", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Scrypted is a home video integration and automation platform. In versions 0.55.0 and prior, a reflected cross-site scripting vulnerability exists in the plugin-http.ts file via the `owner' and 'pkg` parameters. An attacker can run arbitrary JavaScript code. As of time of publication, no known patches are available." + }, + { + "lang": "es", + "value": "Scrypted es una plataforma de automatizaci\u00f3n e integraci\u00f3n de v\u00eddeos dom\u00e9sticos. En las versiones 0.55.0 y anteriores, existe una vulnerabilidad de Cross-Site Scripting Reflejado en el archivo plugin-http.ts a trav\u00e9s de los par\u00e1metros `owner' y `pkg`. Un atacante puede ejecutar c\u00f3digo JavaScript arbitrario. Al momento de la publicaci\u00f3n, no hay parches conocidos disponibles." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47623.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47623.json index 3ab20a38e5f..8b5ebc4dde4 100644 --- a/CVE-2023/CVE-2023-476xx/CVE-2023-47623.json +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47623.json @@ -2,12 +2,16 @@ "id": "CVE-2023-47623", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-13T22:15:43.417", - "lastModified": "2023-12-13T22:15:43.417", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Scrypted is a home video integration and automation platform. In versions 0.55.0 and prior, a reflected cross-site scripting vulnerability exists in the login page via the `redirect_uri` parameter. By specifying a url with the javascript scheme (`javascript:`), an attacker can run arbitrary JavaScript code after the login. As of time of publication, no known patches are available." + }, + { + "lang": "es", + "value": "Scrypted es una plataforma de automatizaci\u00f3n e integraci\u00f3n de v\u00eddeos dom\u00e9sticos. En las versiones 0.55.0 y anteriores, existe una vulnerabilidad de Cross-Site Scripting Reflejado en la p\u00e1gina de inicio de sesi\u00f3n a trav\u00e9s del par\u00e1metro `redirect_uri`. Al especificar una URL con el esquema javascript (`javascript:`), un atacante puede ejecutar c\u00f3digo JavaScript arbitrario despu\u00e9s de iniciar sesi\u00f3n. Al momento de la publicaci\u00f3n, no hay parches conocidos disponibles." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48084.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48084.json index 95a9049bf26..78a4bfad02e 100644 --- a/CVE-2023/CVE-2023-480xx/CVE-2023-48084.json +++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48084.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48084", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T07:15:08.890", - "lastModified": "2023-12-14T07:15:08.890", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48085.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48085.json index 3a2e9d4c6a0..19e33124c75 100644 --- a/CVE-2023/CVE-2023-480xx/CVE-2023-48085.json +++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48085.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48085", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T07:15:09.033", - "lastModified": "2023-12-14T07:15:09.033", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48631.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48631.json new file mode 100644 index 00000000000..2d1ae4e6ad1 --- /dev/null +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48631.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-48631", + "sourceIdentifier": "psirt@adobe.com", + "published": "2023-12-14T13:15:54.250", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "@adobe/css-tools versions 4.3.1 and earlier are affected by an Improper Input Validation vulnerability that could result in a denial of service while attempting to parse CSS." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48676.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48676.json new file mode 100644 index 00000000000..4acf03c66aa --- /dev/null +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48676.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-48676", + "sourceIdentifier": "security@acronis.com", + "published": "2023-12-14T14:15:43.673", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 36943." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@acronis.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@acronis.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://security-advisory.acronis.com/advisories/SEC-5905", + "source": "security@acronis.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48715.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48715.json index 20bb4a698c0..ebc6fce1384 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48715.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48715.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48715", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-11T19:15:08.860", - "lastModified": "2023-12-12T13:43:48.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-14T14:51:04.473", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -50,22 +70,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "15.1-8", + "matchCriteriaId": "EBC945C2-F92B-4763-81DE-D233176CA6D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", + "versionEndExcluding": "15.2.99.103", + "matchCriteriaId": "72217C7D-C8D3-4647-8B76-72BD84D3962A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.2", + "versionEndExcluding": "15.2-4", + "matchCriteriaId": "AE4D1FFC-AD00-4040-BD6A-3F32BBE7B72B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Enalean/tuleap/commit/ea71ec7ee062aae8d1fa7a7325aaa759205c17d8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3m7g-7787-wc68", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=ea71ec7ee062aae8d1fa7a7325aaa759205c17d8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://tuleap.net/plugins/tracker/?aid=35143", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48925.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48925.json index af91bfd7dea..b5309e4a536 100644 --- a/CVE-2023/CVE-2023-489xx/CVE-2023-48925.json +++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48925.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48925", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T09:15:42.193", - "lastModified": "2023-12-14T09:15:42.193", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49355.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49355.json index 6098204d2a7..19076e4166e 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49355.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49355.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49355", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-11T07:15:07.003", - "lastModified": "2023-12-11T12:20:45.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-14T14:47:05.647", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,19 +14,80 @@ "value": "decToString en decNumber/decNumber.c en jq 88f01a7 tiene una escritura fuera de los l\u00edmites de un byte a trav\u00e9s de la entrada \"[]-1.2e-1111111111\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jqlang:jq:1.7-37-g88f01a7:*:*:*:*:*:*:*", + "matchCriteriaId": "13A0413C-DFC6-4B0A-95E2-466AB209E6D8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jqlang/jq/blob/88f01a741c8d63c4d1b5bc3ef61520c6eb93edaa/src/decNumber/decNumber.c#L3764", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/jqlang/jq/tree/88f01a741c8d63c4d1b5bc3ef61520c6eb93edaa", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/linzc21/bug-reports/blob/main/reports/jq/1.7-37-g88f01a7/heap-buffer-overflow/CVE-2023-49355.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49646.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49646.json index 21b3b39196a..e95fcba66c1 100644 --- a/CVE-2023/CVE-2023-496xx/CVE-2023-49646.json +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49646.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49646", "sourceIdentifier": "security@zoom.us", "published": "2023-12-13T23:15:08.357", - "lastModified": "2023-12-13T23:15:08.357", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49707.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49707.json index 3d30f2e1938..22affed310f 100644 --- a/CVE-2023/CVE-2023-497xx/CVE-2023-49707.json +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49707.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49707", "sourceIdentifier": "security@joomla.org", "published": "2023-12-14T09:15:42.240", - "lastModified": "2023-12-14T09:15:42.240", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49708.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49708.json index cb3c179d6f2..c3e7e741224 100644 --- a/CVE-2023/CVE-2023-497xx/CVE-2023-49708.json +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49708.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49708", "sourceIdentifier": "security@joomla.org", "published": "2023-12-14T09:15:42.310", - "lastModified": "2023-12-14T09:15:42.310", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49836.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49836.json new file mode 100644 index 00000000000..be9e697e0ba --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49836.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49836", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-14T14:15:43.903", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brontobytes Cookie Bar allows Stored XSS.This issue affects Cookie Bar: from n/a through 2.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/cookie-bar/wordpress-cookie-bar-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49846.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49846.json new file mode 100644 index 00000000000..273944f425e --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49846.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49846", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-14T14:15:44.113", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paul Bearne Author Avatars List/Block allows Stored XSS.This issue affects Author Avatars List/Block: from n/a through 2.1.17.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/author-avatars/wordpress-author-avatars-list-block-plugin-2-1-16-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49847.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49847.json new file mode 100644 index 00000000000..cb80cb2fbea --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49847.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49847", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-14T14:15:44.320", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Twinpictures Annual Archive allows Stored XSS.This issue affects Annual Archive: from n/a through 1.6.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/anual-archive/wordpress-annual-archive-plugin-1-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49933.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49933.json index 7e41ad8ece8..0abb43bcdb8 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49933.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49933.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49933", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T05:15:08.810", - "lastModified": "2023-12-14T05:15:08.810", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49934.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49934.json index 8e8c12bd116..e80f851a60e 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49934.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49934.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49934", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T05:15:10.023", - "lastModified": "2023-12-14T05:15:10.023", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49935.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49935.json index 5b4cee9ff29..92c89e09a75 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49935.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49935.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49935", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T05:15:10.490", - "lastModified": "2023-12-14T05:15:10.490", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49936.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49936.json index 1c260e44371..a3924cdd187 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49936.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49936.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49936", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T05:15:10.980", - "lastModified": "2023-12-14T05:15:10.980", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49937.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49937.json index 757bee6d094..9782202b541 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49937.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49937.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49937", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T05:15:11.493", - "lastModified": "2023-12-14T05:15:11.493", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49938.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49938.json index b2c20146c60..345f668daa5 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49938.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49938.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49938", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-14T05:15:11.890", - "lastModified": "2023-12-14T05:15:11.890", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49964.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49964.json index 4719ed29a3b..bf6dc7c8619 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49964.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49964.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49964", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-11T08:15:06.603", - "lastModified": "2023-12-11T12:20:45.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-14T14:36:17.293", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,74 @@ "value": "Se descubri\u00f3 un problema en Hyland Alfresco Community Edition hasta 7.2.0. Al insertar contenido malicioso en el archivo folder.get.html.ftl, un atacante puede realizar ataques SSTI (inyecci\u00f3n de plantilla del lado del servidor), que pueden aprovechar los objetos expuestos de FreeMarker para evitar las restricciones y lograr RCE (ejecuci\u00f3n remota de c\u00f3digo). NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2020-12873." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hyland:alfresco_content_services:*:*:*:*:community:*:*:*", + "versionEndIncluding": "7.2.0", + "matchCriteriaId": "D2B41FBE-7025-4B99-A7BD-746F95F022DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mbadanoiu/CVE-2023-49964", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.alfresco.com/products/community/download", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50368.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50368.json new file mode 100644 index 00000000000..54388f58406 --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50368.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-50368", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-14T14:15:44.530", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Averta Shortcodes and extra features for Phlox theme allows Stored XSS.This issue affects Shortcodes and extra features for Phlox theme: from n/a through 2.15.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/auxin-elements/wordpress-shortcodes-and-extra-features-for-phlox-theme-plugin-2-15-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50369.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50369.json new file mode 100644 index 00000000000..7d6eca5b95b --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50369.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-50369", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-14T14:15:44.793", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alma Alma \u2013 Pay in installments or later for WooCommerce allows Stored XSS.This issue affects Alma \u2013 Pay in installments or later for WooCommerce: from n/a through 5.1.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/alma-gateway-for-woocommerce/wordpress-alma-plugin-5-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50370.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50370.json new file mode 100644 index 00000000000..9aadcad2d73 --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50370.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-50370", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-14T14:15:45.027", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh WPBakery Page Builder Addons by Livemesh allows Stored XSS.This issue affects WPBakery Page Builder Addons by Livemesh: from n/a through 3.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/addons-for-visual-composer/wordpress-livemesh-addons-for-wpbakery-page-builder-plugin-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50371.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50371.json new file mode 100644 index 00000000000..bec9df87cc0 --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50371.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-50371", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-12-14T13:15:54.790", + "lastModified": "2023-12-14T14:15:45.243", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Page Visit Counter Advanced Page Visit Counter \u2013 Most Wanted Analytics Plugin for WordPress allows Stored XSS.This issue affects Advanced Page Visit Counter \u2013 Most Wanted Analytics Plugin for WordPress: from n/a through 8.0.6.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/advanced-page-visit-counter/wordpress-advanced-page-visit-counter-plugin-8-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50429.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50429.json index 7aea5c845bc..2ee02d30442 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50429.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50429.json @@ -2,19 +2,80 @@ "id": "CVE-2023-50429", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-09T22:15:07.177", - "lastModified": "2023-12-10T11:50:56.433", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-14T14:33:52.857", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "IzyBat Orange casiers before 20230803_1 allows getEnsemble.php ensemble SQL injection." + }, + { + "lang": "es", + "value": "Los casiers IzyBat Orange anteriores a 20230803_1 permiten la inyecci\u00f3n SQL en conjunto getEnsemble.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:izybat:orange_casiers:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20230803_1", + "matchCriteriaId": "5D80BCAB-E7AD-4841-870D-0E475D563112" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-mc3w-rv8p-f9xf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50709.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50709.json index 0a7de3431c8..4f450fbe2fb 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50709.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50709.json @@ -2,12 +2,16 @@ "id": "CVE-2023-50709", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-13T22:15:43.620", - "lastModified": "2023-12-13T22:15:43.620", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:16.903", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cube is a semantic layer for building data applications. Prior to version 0.34.34, it is possible to make the entire Cube API unavailable by submitting a specially crafted request to a Cube API endpoint. The issue has been patched in `v0.34.34` and it's recommended that all users exposing Cube APIs to the public internet upgrade to the latest version to prevent service disruption.\nThere are currently no workaround for older versions, and the recommendation is to upgrade." + }, + { + "lang": "es", + "value": "Cube es una capa sem\u00e1ntica para crear aplicaciones de datos. Antes de la versi\u00f3n 0.34.34, era posible hacer que toda la API de Cube no estuviera disponible enviando una solicitud especialmente manipulada a un endpoint de la API de Cube. El problema se solucion\u00f3 en `v0.34.34` y se recomienda que todos los usuarios que expongan las API de Cube a la Internet p\u00fablica actualicen a la \u00faltima versi\u00f3n para evitar interrupciones en el servicio. Actualmente no existe ninguna workaround para versiones anteriores y la recomendaci\u00f3n es actualizarlas." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5592.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5592.json new file mode 100644 index 00000000000..b4bf9aceb81 --- /dev/null +++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5592.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-5592", + "sourceIdentifier": "info@cert.vde.com", + "published": "2023-12-14T14:15:45.427", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to download and execute applications without integrity checks on the device which may result in a complete loss of integrity." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], + "references": [ + { + "url": "https://cert.vde.com/en/advisories/VDE-2023-054/", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5629.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5629.json index 3935e6707cf..c2695d071ce 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5629.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5629.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5629", "sourceIdentifier": "cybersecurity@se.com", "published": "2023-12-14T05:15:12.463", - "lastModified": "2023-12-14T05:15:12.463", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5630.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5630.json index a1a92be4d11..479ce719ac2 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5630.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5630.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5630", "sourceIdentifier": "cybersecurity@se.com", "published": "2023-12-14T05:15:13.663", - "lastModified": "2023-12-14T05:15:13.663", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6185.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6185.json index d8df7947185..7831970209f 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6185.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6185.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6185", "sourceIdentifier": "security@documentfoundation.org", "published": "2023-12-11T12:15:07.037", - "lastModified": "2023-12-13T03:15:48.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-14T13:51:13.473", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@documentfoundation.org", "type": "Secondary", @@ -38,18 +58,101 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.5.0", + "versionEndExcluding": "7.5.9", + "matchCriteriaId": "A3620339-BFEE-459E-937D-7F785CEE9C9F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.6.0", + "versionEndExcluding": "7.6.3", + "matchCriteriaId": "65A10E4B-F7DE-4FA8-8ACB-D1A54CCD408E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/", - "source": "security@documentfoundation.org" + "source": "security@documentfoundation.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5574", - "source": "security@documentfoundation.org" + "source": "security@documentfoundation.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185", - "source": "security@documentfoundation.org" + "source": "security@documentfoundation.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6186.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6186.json index 291e5731095..13f25342baf 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6186.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6186.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6186", "sourceIdentifier": "security@documentfoundation.org", "published": "2023-12-11T12:15:07.713", - "lastModified": "2023-12-13T03:15:48.470", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-14T14:41:30.390", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@documentfoundation.org", "type": "Secondary", @@ -38,18 +58,101 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.5.0", + "versionEndExcluding": "7.5.9", + "matchCriteriaId": "A3620339-BFEE-459E-937D-7F785CEE9C9F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.6.0", + "versionEndExcluding": "7.6.4", + "matchCriteriaId": "5C255150-B48F-4F2A-8E7E-0C9D6CA3504D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/", - "source": "security@documentfoundation.org" + "source": "security@documentfoundation.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5574", - "source": "security@documentfoundation.org" + "source": "security@documentfoundation.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186", - "source": "security@documentfoundation.org" + "source": "security@documentfoundation.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json index a15043f14c5..cbc25ada2d7 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json @@ -2,12 +2,12 @@ "id": "CVE-2023-6275", "sourceIdentifier": "cna@vuldb.com", "published": "2023-11-24T15:15:07.783", - "lastModified": "2023-12-12T18:15:23.363", + "lastModified": "2023-12-14T14:15:45.640", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input \"> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input \"> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6407.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6407.json index 5e21c11a3a2..c7c61306f6d 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6407.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6407.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6407", "sourceIdentifier": "cybersecurity@se.com", "published": "2023-12-14T05:15:14.407", - "lastModified": "2023-12-14T05:15:14.407", - "vulnStatus": "Received", + "lastModified": "2023-12-14T13:52:06.780", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6545.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6545.json new file mode 100644 index 00000000000..f7eaa5e83dc --- /dev/null +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6545.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-6545", + "sourceIdentifier": "info@cert.vde.com", + "published": "2023-12-14T14:15:45.753", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The package authelia-bhf included in Beckhoffs TwinCAT/BSD is prone to an open redirect that allows a remote unprivileged attacker to redirect a user to another site. This may have limited impact to integrity and does solely affect anthelia-bhf the Beckhoff fork of authelia." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "info@cert.vde.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://cert.vde.com/en/advisories/VDE-2023-067/", + "source": "info@cert.vde.com" + }, + { + "url": "https://download.beckhoff.com/download/Document/product-security/Advisories/advisory-2023-001.pdf", + "source": "info@cert.vde.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6569.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6569.json new file mode 100644 index 00000000000..c2d134d9553 --- /dev/null +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6569.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-6569", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-12-14T13:15:55.020", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "External Control of File Name or Path in h2oai/h2o-3" + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://huntr.com/bounties/a5d003dc-c23e-4c98-8dcf-35ba9252fa3c", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6570.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6570.json new file mode 100644 index 00000000000..7d73c1ee8f6 --- /dev/null +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6570.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-6570", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-12-14T13:15:55.230", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) in kubeflow/kubeflow" + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://huntr.com/bounties/82d6e853-013b-4029-a23f-8b50ec56602a", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6571.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6571.json new file mode 100644 index 00000000000..72734b08469 --- /dev/null +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6571.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-6571", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-12-14T13:15:55.423", + "lastModified": "2023-12-14T13:51:59.903", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site Scripting (XSS) - Reflected in kubeflow/kubeflow" + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://huntr.com/bounties/f02781e7-2a53-4c66-aa32-babb16434632", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6572.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6572.json new file mode 100644 index 00000000000..81b929c4d1e --- /dev/null +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6572.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-6572", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-12-14T14:15:46.013", + "lastModified": "2023-12-14T14:49:08.357", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository gradio-app/gradio prior to main." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gradio-app/gradio/commit/5b5af1899dd98d63e1f9b48a93601c2db1f56520", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/21d2ff0c-d43a-4afd-bb4d-049ee8da5b5c", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 020e507f7e0..481e3072825 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-14T11:00:18.298653+00:00 +2023-12-14T15:00:26.600999+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-14T10:15:08.727000+00:00 +2023-12-14T14:55:04.343000+00:00 ``` ### Last Data Feed Release @@ -29,44 +29,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -233119 +233141 ``` ### CVEs added in the last Commit -Recently added CVEs: `14` +Recently added CVEs: `22` -* [CVE-2023-40627](CVE-2023/CVE-2023-406xx/CVE-2023-40627.json) (`2023-12-14T09:15:41.397`) -* [CVE-2023-40628](CVE-2023/CVE-2023-406xx/CVE-2023-40628.json) (`2023-12-14T09:15:41.480`) -* [CVE-2023-40629](CVE-2023/CVE-2023-406xx/CVE-2023-40629.json) (`2023-12-14T09:15:41.550`) -* [CVE-2023-40630](CVE-2023/CVE-2023-406xx/CVE-2023-40630.json) (`2023-12-14T09:15:41.630`) -* [CVE-2023-40655](CVE-2023/CVE-2023-406xx/CVE-2023-40655.json) (`2023-12-14T09:15:41.707`) -* [CVE-2023-40656](CVE-2023/CVE-2023-406xx/CVE-2023-40656.json) (`2023-12-14T09:15:41.780`) -* [CVE-2023-40657](CVE-2023/CVE-2023-406xx/CVE-2023-40657.json) (`2023-12-14T09:15:41.850`) -* [CVE-2023-40658](CVE-2023/CVE-2023-406xx/CVE-2023-40658.json) (`2023-12-14T09:15:41.920`) -* [CVE-2023-40659](CVE-2023/CVE-2023-406xx/CVE-2023-40659.json) (`2023-12-14T09:15:41.993`) -* [CVE-2023-46348](CVE-2023/CVE-2023-463xx/CVE-2023-46348.json) (`2023-12-14T09:15:42.060`) -* [CVE-2023-46750](CVE-2023/CVE-2023-467xx/CVE-2023-46750.json) (`2023-12-14T09:15:42.107`) -* [CVE-2023-48925](CVE-2023/CVE-2023-489xx/CVE-2023-48925.json) (`2023-12-14T09:15:42.193`) -* [CVE-2023-49707](CVE-2023/CVE-2023-497xx/CVE-2023-49707.json) (`2023-12-14T09:15:42.240`) -* [CVE-2023-49708](CVE-2023/CVE-2023-497xx/CVE-2023-49708.json) (`2023-12-14T09:15:42.310`) +* [CVE-2023-48631](CVE-2023/CVE-2023-486xx/CVE-2023-48631.json) (`2023-12-14T13:15:54.250`) +* [CVE-2023-6569](CVE-2023/CVE-2023-65xx/CVE-2023-6569.json) (`2023-12-14T13:15:55.020`) +* [CVE-2023-6570](CVE-2023/CVE-2023-65xx/CVE-2023-6570.json) (`2023-12-14T13:15:55.230`) +* [CVE-2023-6571](CVE-2023/CVE-2023-65xx/CVE-2023-6571.json) (`2023-12-14T13:15:55.423`) +* [CVE-2023-50371](CVE-2023/CVE-2023-503xx/CVE-2023-50371.json) (`2023-12-14T13:15:54.790`) +* [CVE-2023-0757](CVE-2023/CVE-2023-07xx/CVE-2023-0757.json) (`2023-12-14T14:15:42.083`) +* [CVE-2023-45182](CVE-2023/CVE-2023-451xx/CVE-2023-45182.json) (`2023-12-14T14:15:42.333`) +* [CVE-2023-45185](CVE-2023/CVE-2023-451xx/CVE-2023-45185.json) (`2023-12-14T14:15:42.553`) +* [CVE-2023-46141](CVE-2023/CVE-2023-461xx/CVE-2023-46141.json) (`2023-12-14T14:15:42.767`) +* [CVE-2023-46142](CVE-2023/CVE-2023-461xx/CVE-2023-46142.json) (`2023-12-14T14:15:42.983`) +* [CVE-2023-46143](CVE-2023/CVE-2023-461xx/CVE-2023-46143.json) (`2023-12-14T14:15:43.207`) +* [CVE-2023-46144](CVE-2023/CVE-2023-461xx/CVE-2023-46144.json) (`2023-12-14T14:15:43.447`) +* [CVE-2023-48676](CVE-2023/CVE-2023-486xx/CVE-2023-48676.json) (`2023-12-14T14:15:43.673`) +* [CVE-2023-49836](CVE-2023/CVE-2023-498xx/CVE-2023-49836.json) (`2023-12-14T14:15:43.903`) +* [CVE-2023-49846](CVE-2023/CVE-2023-498xx/CVE-2023-49846.json) (`2023-12-14T14:15:44.113`) +* [CVE-2023-49847](CVE-2023/CVE-2023-498xx/CVE-2023-49847.json) (`2023-12-14T14:15:44.320`) +* [CVE-2023-50368](CVE-2023/CVE-2023-503xx/CVE-2023-50368.json) (`2023-12-14T14:15:44.530`) +* [CVE-2023-50369](CVE-2023/CVE-2023-503xx/CVE-2023-50369.json) (`2023-12-14T14:15:44.793`) +* [CVE-2023-50370](CVE-2023/CVE-2023-503xx/CVE-2023-50370.json) (`2023-12-14T14:15:45.027`) +* [CVE-2023-5592](CVE-2023/CVE-2023-55xx/CVE-2023-5592.json) (`2023-12-14T14:15:45.427`) +* [CVE-2023-6545](CVE-2023/CVE-2023-65xx/CVE-2023-6545.json) (`2023-12-14T14:15:45.753`) +* [CVE-2023-6572](CVE-2023/CVE-2023-65xx/CVE-2023-6572.json) (`2023-12-14T14:15:46.013`) ### CVEs modified in the last Commit -Recently modified CVEs: `11` +Recently modified CVEs: `69` -* [CVE-2023-34053](CVE-2023/CVE-2023-340xx/CVE-2023-34053.json) (`2023-12-14T10:15:07.520`) -* [CVE-2023-41164](CVE-2023/CVE-2023-411xx/CVE-2023-41164.json) (`2023-12-14T10:15:07.630`) -* [CVE-2023-41268](CVE-2023/CVE-2023-412xx/CVE-2023-41268.json) (`2023-12-14T10:15:07.723`) -* [CVE-2023-45283](CVE-2023/CVE-2023-452xx/CVE-2023-45283.json) (`2023-12-14T10:15:07.947`) -* [CVE-2023-46589](CVE-2023/CVE-2023-465xx/CVE-2023-46589.json) (`2023-12-14T10:15:08.053`) -* [CVE-2023-46695](CVE-2023/CVE-2023-466xx/CVE-2023-46695.json) (`2023-12-14T10:15:08.170`) -* [CVE-2023-46728](CVE-2023/CVE-2023-467xx/CVE-2023-46728.json) (`2023-12-14T10:15:08.277`) -* [CVE-2023-46848](CVE-2023/CVE-2023-468xx/CVE-2023-46848.json) (`2023-12-14T10:15:08.390`) -* [CVE-2023-50164](CVE-2023/CVE-2023-501xx/CVE-2023-50164.json) (`2023-12-14T10:15:08.530`) -* [CVE-2023-5941](CVE-2023/CVE-2023-59xx/CVE-2023-5941.json) (`2023-12-14T10:15:08.630`) -* [CVE-2023-5978](CVE-2023/CVE-2023-59xx/CVE-2023-5978.json) (`2023-12-14T10:15:08.727`) +* [CVE-2023-43585](CVE-2023/CVE-2023-435xx/CVE-2023-43585.json) (`2023-12-14T13:52:16.903`) +* [CVE-2023-43586](CVE-2023/CVE-2023-435xx/CVE-2023-43586.json) (`2023-12-14T13:52:16.903`) +* [CVE-2023-45166](CVE-2023/CVE-2023-451xx/CVE-2023-45166.json) (`2023-12-14T13:52:16.903`) +* [CVE-2023-45170](CVE-2023/CVE-2023-451xx/CVE-2023-45170.json) (`2023-12-14T13:52:16.903`) +* [CVE-2023-45174](CVE-2023/CVE-2023-451xx/CVE-2023-45174.json) (`2023-12-14T13:52:16.903`) +* [CVE-2023-49646](CVE-2023/CVE-2023-496xx/CVE-2023-49646.json) (`2023-12-14T13:52:16.903`) +* [CVE-2023-21751](CVE-2023/CVE-2023-217xx/CVE-2023-21751.json) (`2023-12-14T13:52:16.903`) +* [CVE-2023-40921](CVE-2023/CVE-2023-409xx/CVE-2023-40921.json) (`2023-12-14T13:52:16.903`) +* [CVE-2023-41618](CVE-2023/CVE-2023-416xx/CVE-2023-41618.json) (`2023-12-14T13:52:16.903`) +* [CVE-2023-31546](CVE-2023/CVE-2023-315xx/CVE-2023-31546.json) (`2023-12-14T13:52:16.903`) +* [CVE-2023-43042](CVE-2023/CVE-2023-430xx/CVE-2023-43042.json) (`2023-12-14T13:52:16.903`) +* [CVE-2023-41719](CVE-2023/CVE-2023-417xx/CVE-2023-41719.json) (`2023-12-14T13:52:16.903`) +* [CVE-2023-42922](CVE-2023/CVE-2023-429xx/CVE-2023-42922.json) (`2023-12-14T14:05:30.140`) +* [CVE-2023-42899](CVE-2023/CVE-2023-428xx/CVE-2023-42899.json) (`2023-12-14T14:07:42.957`) +* [CVE-2023-42919](CVE-2023/CVE-2023-429xx/CVE-2023-42919.json) (`2023-12-14T14:08:16.317`) +* [CVE-2023-6275](CVE-2023/CVE-2023-62xx/CVE-2023-6275.json) (`2023-12-14T14:15:45.640`) +* [CVE-2023-50429](CVE-2023/CVE-2023-504xx/CVE-2023-50429.json) (`2023-12-14T14:33:52.857`) +* [CVE-2023-49964](CVE-2023/CVE-2023-499xx/CVE-2023-49964.json) (`2023-12-14T14:36:17.293`) +* [CVE-2023-6186](CVE-2023/CVE-2023-61xx/CVE-2023-6186.json) (`2023-12-14T14:41:30.390`) +* [CVE-2023-49355](CVE-2023/CVE-2023-493xx/CVE-2023-49355.json) (`2023-12-14T14:47:05.647`) +* [CVE-2023-45866](CVE-2023/CVE-2023-458xx/CVE-2023-45866.json) (`2023-12-14T14:47:57.930`) +* [CVE-2023-32460](CVE-2023/CVE-2023-324xx/CVE-2023-32460.json) (`2023-12-14T14:48:51.007`) +* [CVE-2023-48715](CVE-2023/CVE-2023-487xx/CVE-2023-48715.json) (`2023-12-14T14:51:04.473`) +* [CVE-2023-42914](CVE-2023/CVE-2023-429xx/CVE-2023-42914.json) (`2023-12-14T14:54:10.347`) +* [CVE-2023-42900](CVE-2023/CVE-2023-429xx/CVE-2023-42900.json) (`2023-12-14T14:55:04.343`) ## Download and Usage