diff --git a/CVE-2015/CVE-2015-31xx/CVE-2015-3183.json b/CVE-2015/CVE-2015-31xx/CVE-2015-3183.json
index 6924b75eb1c..bee72ccb738 100644
--- a/CVE-2015/CVE-2015-31xx/CVE-2015-3183.json
+++ b/CVE-2015/CVE-2015-31xx/CVE-2015-3183.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-3183",
"sourceIdentifier": "secalert@redhat.com",
"published": "2015-07-20T23:59:02.877",
- "lastModified": "2023-11-07T02:25:30.970",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-12-14T14:06:55.763",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -67,8 +67,16 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "2.4.13",
- "matchCriteriaId": "C6A2E38C-9D0B-4973-A314-E5928B41D702"
+ "versionStartIncluding": "2.2.0",
+ "versionEndExcluding": "2.2.31",
+ "matchCriteriaId": "FADCA439-D2D8-4329-AD6E-BDA215BF6EB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.4.0",
+ "versionEndExcluding": "2.4.16",
+ "matchCriteriaId": "42D9DB2C-AA6E-4633-AB01-7E551E36E912"
}
]
}
@@ -85,211 +93,378 @@
},
{
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1666.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1667.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1668.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-2661.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2016-0061.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2016-2054.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2016-2055.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2016-2056.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "http://www.debian.org/security/2015/dsa-3325",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.securityfocus.com/bid/75963",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.securityfocus.com/bid/91787",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.securitytracker.com/id/1032967",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.ubuntu.com/usn/USN-2686-1",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2015:2659",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2015:2660",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/apache/httpd/commit/a6027e56924bb6227c1fdbf6f91e7e2438338be6",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/apache/httpd/commit/e427c41257957b57036d5a549b260b6185d1dd73",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://puppet.com/security/cve/CVE-2015-3183",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/201610-02",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/HT205219",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://support.apple.com/kb/HT205031",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2015/CVE-2015-89xx/CVE-2015-8963.json b/CVE-2015/CVE-2015-89xx/CVE-2015-8963.json
index 65a1a4eee4f..8b9150f11ac 100644
--- a/CVE-2015/CVE-2015-89xx/CVE-2015-8963.json
+++ b/CVE-2015/CVE-2015-89xx/CVE-2015-8963.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-8963",
"sourceIdentifier": "security@android.com",
"published": "2016-11-16T05:59:02.890",
- "lastModified": "2016-11-28T19:50:54.427",
- "vulnStatus": "Modified",
+ "lastModified": "2023-12-14T14:06:01.427",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,13 +15,13 @@
}
],
"metrics": {
- "cvssMetricV30": [
+ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
- "version": "3.0",
- "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@@ -89,8 +89,29 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "4.3.6",
- "matchCriteriaId": "2B389602-4271-4CF2-BA64-4B0DAD8AB4A9"
+ "versionEndExcluding": "3.2.85",
+ "matchCriteriaId": "9A5A178A-A60C-4053-AEE0-5164430206AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.3",
+ "versionEndExcluding": "3.16.40",
+ "matchCriteriaId": "6C5B0F97-B38C-412B-93E9-148AC6F6B58E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.17",
+ "versionEndExcluding": "3.18.54",
+ "matchCriteriaId": "56806170-9BCD-4160-A14A-558EFAB98EC8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.19",
+ "versionEndExcluding": "4.4",
+ "matchCriteriaId": "2E5A3570-BCD5-4B21-89DF-F509EBA1A032"
}
]
}
@@ -103,6 +124,7 @@
"source": "security@android.com",
"tags": [
"Patch",
+ "Third Party Advisory",
"Vendor Advisory"
]
},
@@ -115,7 +137,11 @@
},
{
"url": "http://www.securityfocus.com/bid/94207",
- "source": "security@android.com"
+ "source": "security@android.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://github.com/torvalds/linux/commit/12ca6ad2e3a896256f086497a7c7406a547ee373",
diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43843.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43843.json
index 17d4d2bfcf1..b66f48240ae 100644
--- a/CVE-2022/CVE-2022-438xx/CVE-2022-43843.json
+++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43843.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43843",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-14T01:15:07.453",
- "lastModified": "2023-12-14T01:15:07.453",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0757.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0757.json
new file mode 100644
index 00000000000..04350f42aed
--- /dev/null
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0757.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-0757",
+ "sourceIdentifier": "info@cert.vde.com",
+ "published": "2023-12-14T14:15:42.083",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to upload arbitrary malicious code and gain full access on the affected device."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-732"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://cert.vde.com/en/advisories/VDE-2023-051/",
+ "source": "info@cert.vde.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1904.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1904.json
index 0dd62369965..706db0aa9ff 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1904.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1904.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1904",
"sourceIdentifier": "security@octopus.com",
"published": "2023-12-14T08:15:36.550",
- "lastModified": "2023-12-14T08:15:36.550",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21751.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21751.json
index 09dc5bade7f..7532f637fec 100644
--- a/CVE-2023/CVE-2023-217xx/CVE-2023-21751.json
+++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21751.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-21751",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-12-14T00:15:42.863",
- "lastModified": "2023-12-14T00:15:42.863",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25642.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25642.json
index 37f994e43a2..d5af6bbaeab 100644
--- a/CVE-2023/CVE-2023-256xx/CVE-2023-25642.json
+++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25642.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25642",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2023-12-14T08:15:37.717",
- "lastModified": "2023-12-14T08:15:37.717",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25643.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25643.json
index 5c0bfb84575..3fb68539a75 100644
--- a/CVE-2023/CVE-2023-256xx/CVE-2023-25643.json
+++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25643.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25643",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2023-12-14T08:15:38.357",
- "lastModified": "2023-12-14T08:15:38.357",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25644.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25644.json
index c431e2a4a15..beb54cf9926 100644
--- a/CVE-2023/CVE-2023-256xx/CVE-2023-25644.json
+++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25644.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25644",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2023-12-14T08:15:38.997",
- "lastModified": "2023-12-14T08:15:38.997",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25648.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25648.json
index 3a6a7e852dd..a32dd3f478f 100644
--- a/CVE-2023/CVE-2023-256xx/CVE-2023-25648.json
+++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25648.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25648",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2023-12-14T07:15:07.180",
- "lastModified": "2023-12-14T07:15:07.180",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25650.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25650.json
index 8c851d3d1a7..d7008d34e00 100644
--- a/CVE-2023/CVE-2023-256xx/CVE-2023-25650.json
+++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25650.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25650",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2023-12-14T07:15:07.783",
- "lastModified": "2023-12-14T07:15:07.783",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25651.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25651.json
index 48d483a077e..2572d36f771 100644
--- a/CVE-2023/CVE-2023-256xx/CVE-2023-25651.json
+++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25651.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25651",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2023-12-14T07:15:08.270",
- "lastModified": "2023-12-14T07:15:08.270",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31546.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31546.json
index 2200f79c873..aeb4921ea57 100644
--- a/CVE-2023/CVE-2023-315xx/CVE-2023-31546.json
+++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31546.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-31546",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T01:15:07.850",
- "lastModified": "2023-12-14T01:15:07.850",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32460.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32460.json
index 092de46fa20..aaf6c02e718 100644
--- a/CVE-2023/CVE-2023-324xx/CVE-2023-32460.json
+++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32460.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-32460",
"sourceIdentifier": "security_alert@emc.com",
"published": "2023-12-08T06:15:45.427",
- "lastModified": "2023-12-08T14:23:10.393",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-14T14:48:51.007",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nDell PowerEdge BIOS contains an improper privilege management security vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to privilege escalation.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Dell PowerEdge BIOS contiene una vulnerabilidad de seguridad de administraci\u00f3n de privilegios inadecuada. Un atacante local no autenticado podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una escalada de privilegios."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "security_alert@emc.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
{
"source": "security_alert@emc.com",
"type": "Secondary",
@@ -46,10 +80,3543 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r660_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "CAC1D044-C214-4ACE-A4B7-D969C4E39BC6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r660:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "86AC134C-EFB7-46B8-B60F-5BD2663D7168"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r760_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "455904B1-B7A3-41E3-B76F-E55F621FA713"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r760:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89E8485C-4298-4DA0-95AD-50C21BC2C798"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_c6620_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "4D00800C-1C21-4426-B862-615C5943AC43"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_c6620:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D360EB7D-5AB4-483C-BF00-53473B2D8AF4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_mx760c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "72272227-F1F7-4281-A45E-EAF38A98F6D9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_mx760c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2670A942-4200-46F2-A4FC-6D2F0E2074B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r860_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "54369267-A066-437A-B6B6-4286EBA8633B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r860:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B53D6488-A6E3-4505-8093-8232DC4219BD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r960_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "4298A5CB-503B-4650-B8AB-C74A2A571056"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r960:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5B42153-ED7B-433A-9070-9CAC972322BA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_hs5610_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "59F7FAEC-7E06-4BED-9593-9DA927CC0DEC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_hs5610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "08A9C14A-7D1A-4724-BBBD-62FC4C66FCE1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_hs5620_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "326FECA8-4534-4296-97F8-0142A056CEBA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_hs5620:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "447BE381-9C9B-4339-B308-71D90DB60294"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r660xs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "861C9493-04D9-4B0E-99EF-63C362A4ABD2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r660xs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "17FF7F29-F169-49B5-BEBA-6F20E3CDF1E6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r760xs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "F15C3D36-575A-4137-BA5F-2EBC41A282E3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r760xs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3364A3E-BA9B-4588-89E5-A2C6C17B5D97"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r760xd2_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "2151C4BF-EDE5-4971-A286-BEDFA8F87E28"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r760xd2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B21CBCD8-266A-4BCD-933D-2EF5F479B119"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_t560_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "8785176F-66AC-46B7-83FA-27E7F226EA75"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_t560:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D4A86D53-1352-48FB-A26A-C898B2C6425E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r760xa_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "7BA1CBD1-3507-4889-9E34-1D3CEC551F9F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r760xa:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62603619-611F-4343-B75E-D45C50D1EA2F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xr5610_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "57EC977C-0AD6-461B-A809-4F653A4878F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xr5610:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "788BF4F3-2AA4-4DF5-A829-66891BBB219D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xr8610t_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "685B69D4-BC30-4DDC-84A3-1B1E3C65EDE9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xr8610t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E371B4A2-52F2-4282-BDBC-C1517798A540"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xr8620t_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "08D5B85A-DBAD-4539-B8AF-5B5271C09BCE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xr8620t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C6E850B8-521D-4E3E-8179-1202BE9EC62E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r6615_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "7D3DAA7B-23C2-4419-B952-610031FEEDD8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r6615:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73077527-E12D-495C-AB91-C35109AE4C43"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r7615_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "A0DC02E0-E2B0-4F97-A9B8-C9D4F0971E0B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r7615:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A74500E4-ADD2-4134-8D60-F4285C158F93"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xr7620_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "B2F1ED00-4162-4E8B-9FD2-C808BFCF0DFC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xr7620:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD309417-5B3B-4FB1-BDD6-5EAC8E21B3B0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xe8640_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.3.6",
+ "matchCriteriaId": "9917917B-3479-42A8-BFB4-3D5B74997166"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xe8640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "990D292B-17A2-420A-A64A-EB436162FF31"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xe9640_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.3.6",
+ "matchCriteriaId": "54A3D7B9-44C3-4162-B60D-2AEE0B495FE9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xe9640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25CCFD10-C62A-4549-B389-ABBD44E9EE64"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xe9680_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.3.6",
+ "matchCriteriaId": "9A021A19-A416-493E-B922-F60265FAF8AA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xe9680:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "636676E8-9ECA-48B2-976A-7173CDEB026D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r6625_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.8",
+ "matchCriteriaId": "D17CDE09-0AE2-4082-8E6B-E0488A8C2DF8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r6625:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09981777-C86C-4BC6-8834-97E8A2551897"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r7625_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.8",
+ "matchCriteriaId": "30FE2455-8D61-424A-A6CA-1AB7A6E18FA2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r7625:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F074158-252A-4C51-B80C-1B94E22A364A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_c6615_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.1.2",
+ "matchCriteriaId": "E379DDB9-CF28-4EDB-A4A9-B6A31D716DFF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_c6615:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "788C678A-92CF-45BD-99D5-AF18394C9860"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r650_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "7524BFD6-AED5-4451-AB28-64E6FC5F010C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "18C87CDE-E138-4709-91B9-0111B18313C6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r750_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "0D90FED6-00BB-41AF-981C-4C6B6A5052BD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r750:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "804EDA15-E6C0-4D51-BC53-FCE71FA7B591"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r750xa_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "1EF539F0-43EA-4A0E-B307-4272DB7AAE9B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r750xa:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F5378D9-A940-40AD-9E16-90107855840B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_c6520_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "5F596B3D-7C8D-4F21-AC99-0ECF9F3D2D14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_c6520:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A9D48343-BB79-4204-B521-89E0C0EECA54"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_mx750c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "DECF62C4-41CD-4713-B0E0-D97CE91210A7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_mx750c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E7173B68-FD26-4414-9CEE-A8B7EA4729BE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r550_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "8BD035C8-AA91-4296-B965-B37FC03122E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0EFF840F-D2E6-42D3-8590-FE5C0960442D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r450_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "11F1C359-EB77-4781-8379-05CDA6673176"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r450:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E29D0AE9-FB8F-4FCA-9D5B-4987312AB9FA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r650xs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "8B15C1C8-8B54-4D9A-94F7-7A84BB50F505"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r650xs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "496FC5E6-B5A5-4054-ACE0-893E56B22F78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r750xs_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "B601C38F-C29F-4212-B4B9-EB7A94A0588E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r750xs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EAF00878-2C77-4703-BF06-7CEC413374E3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_t550_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "5188887B-58C8-4BC2-BA80-AA0F55B0E884"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_t550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3FCB14D-D874-4E6A-ABAA-74786AE6F715"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xr11_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "9E582144-6F55-4B77-83AC-8631BCA29A11"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xr11:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "37025301-D1A0-45D2-B07B-6D71D79D8160"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xr12_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "77884F68-FB28-4D16-B71D-AFD64BB95AD3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xr12:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BD39D46-D556-474D-A59C-A4400A43A172"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_t150_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.8.1",
+ "matchCriteriaId": "D6504363-EE36-47BB-84AB-04F6A05B0706"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_t150:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8EEF28D5-BCD8-4DF8-9635-9520B621F69D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_t350_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.8.1",
+ "matchCriteriaId": "B91588C8-1B2F-4B4B-9C4E-95C20096F765"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_t350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8C23BA8A-49F1-4BF4-B4B6-8C0D1B9E3A96"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r250_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.8.1",
+ "matchCriteriaId": "D5969F4E-838A-43DC-A9B7-2D4A9E762B79"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "979B7476-13BE-4F6A-A8F2-C4D5861EC9DB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r350_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.8.1",
+ "matchCriteriaId": "F1EDD12D-3227-4D0D-9F1E-578D22A70F34"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB51F224-453D-414A-ACA2-31BBABD4F6F0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xr4510c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.13.3",
+ "matchCriteriaId": "CA1A8E2F-10DD-4998-B68D-F319AC27D7A0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xr4510c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "08C108AA-0A97-4AA0-ACC7-BE6BE6C502AD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xr4520c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.13.3",
+ "matchCriteriaId": "E40537E2-F363-4213-9C1B-361FBE6DA4FD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xr4520c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A957B9D0-14AA-4AED-9579-49B6A406ED21"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r6515_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.13.3",
+ "matchCriteriaId": "3D55C57A-77C1-4A5B-864A-EBBEB2B722F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r6515:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D00F86E-6591-41FA-A6E0-DC89CBE8108C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r6525_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.13.3",
+ "matchCriteriaId": "8B3BAD22-AEAB-4546-BE89-DE766568F61A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r6525:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EC11F70-7D34-431C-93D3-F37B664FCDAD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r7515_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.13.3",
+ "matchCriteriaId": "69967643-07F3-4D95-9901-019105CD49B8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r7515:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F9D7E374-38A9-4163-8385-8D8EB682A582"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r7525_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.13.3",
+ "matchCriteriaId": "ED7CC5AA-6BCC-4BD8-9CF8-21123DA329F1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r7525:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A9CDF7A1-8BF1-4020-94EC-FFEDC663386B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_c6525_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.13.3",
+ "matchCriteriaId": "369719D8-E99D-47EF-BFD3-96A92D58826D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_c6525:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65B387A6-EFA5-4711-ACE7-45436426059A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xe8545_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.13.3",
+ "matchCriteriaId": "939024E5-DCE1-4F54-B226-90F9759FA6B2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xe8545:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "418E58B7-33BF-4332-ABE7-2475747624C4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r740_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "D98D731A-3950-4279-A63E-A2CD6A7063DA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r740:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DE562535-3D9B-4A82-AC0D-6A2225E63E8D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r640_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "DA5290BF-A3FB-4035-9148-46D66AC2C835"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "81416C16-D7FA-4165-BB0E-6458A4EA5AEE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r940_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "E6BDF269-EEC3-47A7-A824-93D0CB915473"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r940:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B581E1DE-4E94-49E5-B5CF-2A94B2570708"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r540_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "8AFCEDF9-936F-4A37-AE20-68C705728854"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r540:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73B27F54-3CE3-4A5F-BBA1-2C6ED5316B47"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r440_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "A735CB99-56D5-4CD7-9543-6AE947A8EB7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r440:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EBC3957E-791A-4052-A9C4-F3ECBD746E37"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_t440_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "4770F9CF-ADAA-4048-A1A5-A06E1E4AE2C7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_t440:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28F97F1A-B41E-4CC5-B668-8C194CE2C29E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xr2_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "1C8FDF66-FAB7-43EC-A00F-D2F7BE208B68"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xr2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88EC4390-C39F-4E56-9631-B8A22986690D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r840_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "06D37EA7-693C-4F87-B0B6-DBE4769F69F7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r840:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E058B9C6-CD1C-42F5-8781-05450254E9E5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_t640_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "0031CA99-76C0-42A7-B0EC-0B9A815DD5A5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_t640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1DEC0235-DDA1-4EE4-B3F8-512F1B29AFC6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_c6420_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "77608589-52B4-4358-A8A4-C32601E8901B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_c6420:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "027D86DE-076F-4CE9-9DE9-E6976C655E8F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_fc640_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "7958FB05-8940-4F62-94EA-6626DC373963"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_fc640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E9C59D4B-1122-4782-A686-559E7DF8C3C9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_m640_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "DD109FE6-F05C-44B8-86E2-5939CA7C52E3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_m640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5F8B50A1-577F-451E-8D03-C8A6A78000DC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_c4140_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "9C7D6956-DF48-45CC-956D-2507FA1556F4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_c4140:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F9ACC9B8-C046-4304-BA58-7D6D7945BE95"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_mx740c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "18E7E17B-2C69-42CE-B73F-F85E1DDAFE35"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_mx740c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "757039D5-60B9-40B0-B719-38E27409BDDE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_mx840c_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "B73A91F7-3271-4507-A76D-25A3E3E20168"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_mx840c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4305D0F-CB59-49D5-8D21-8ECC3342C36C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r740xd_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "E9636D81-B033-4A3C-9F9A-5CE0AA22A175"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r740xd:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "868ECD3F-77CD-4F5D-86E5-61689E4C5BA0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r740xd2_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "60564058-0015-4BBC-8B8C-459B9FC43446"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r740xd2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A5395D3F-58D4-49F9-AA2F-0D5C6D8C4651"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r940xa_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "AD4D0041-8F4E-4FA4-BC8C-D2F9C21F3A88"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r940xa:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3D143853-3D62-4AD7-B899-F726036A34D2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xe2420_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.0",
+ "matchCriteriaId": "91AD7660-E855-4F55-A049-FB727F82A826"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xe2420:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "30D12E41-8F03-435C-B137-CD3465923E5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xe7420_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.0",
+ "matchCriteriaId": "E29EE809-1DCE-474B-982C-4CFCD0794371"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xe7420:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB402EFE-DEFF-40D1-B1C8-8A7D6923669E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_xe7440_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.0",
+ "matchCriteriaId": "91D105A9-1525-4C2C-9ACB-A973048E0BAC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_xe7440:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB265071-7294-4317-A854-0D90844CDC17"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_t140_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.15.1",
+ "matchCriteriaId": "33A15C6B-5DC5-4881-884A-ED891D8D5B63"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_t140:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E2E7999-9125-4915-8AA3-A3A7F09C5B83"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_t340_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.15.1",
+ "matchCriteriaId": "0B5D9C73-EF4C-4B26-8DDE-2E91F8D1E800"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_t340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3AF6A5D-6297-4640-9693-51770B5A4B3A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r240_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.15.1",
+ "matchCriteriaId": "96D7A70E-5D50-4EDC-A5D8-E084EC020CDF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r240:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BA8A110-B800-4DA1-B87E-50F925780746"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r340_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.15.1",
+ "matchCriteriaId": "2C8B6DCF-4DD5-4BAB-BD66-B80125A7500A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3335BF65-71A1-4045-902B-CD5C69336D8A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r6415_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.21.0",
+ "matchCriteriaId": "DF0CB761-3729-4FE2-873F-D041FF22AC7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r6415:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22059909-792A-4D78-B626-584608398A8B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r7415_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.21.0",
+ "matchCriteriaId": "7F0E4094-8F39-4415-9785-CA248ACDF0E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r7415:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3BC6AF0A-A077-4D94-AE94-D5189355AF3F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r7425_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.21.0",
+ "matchCriteriaId": "21514D06-11FA-4981-A145-FB5B3CEAAE9F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r7425:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DEC88086-855D-4378-9DB6-3E89D3275A01"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r930_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.13.0",
+ "matchCriteriaId": "150E7E7B-D10A-4685-BA87-B1EFD2892380"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r930:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1669BF88-F4AC-4166-B657-A5E0EB95F206"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r730_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "7F23D6B8-CF4F-4955-B2F7-CDE23CB275F5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r730:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F2D8095-BFAD-4A4C-92EF-5C27AC5860FC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r730xd_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "518769F6-CF15-48D1-BCE3-F6B2F86D8D14"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r730xd:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F20FC968-9159-4514-9001-B6E14AAC9BB4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r630_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "9AAB5E19-CDE6-4AAD-9275-80A52658FA57"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r630:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3889B4D3-0B99-44AC-B732-809F7652C9D2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_c4130_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "FC44C9C8-4AF5-4570-8526-A603D3190215"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_c4130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89E0CC72-B046-4F7C-B7FD-E8E0995C0333"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_m630_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "56B1B7E6-AC74-42B5-9CDD-22EBE6F79C5D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_m630:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "05ABA114-D098-48D2-9E0F-E021D82F08B2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_fc630_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "CC4E56B5-1421-470A-B558-B13666A2C95D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_fc630:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9E5481DE-457C-44D4-A3FE-10DB525699E3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_fc430_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "2DFD298A-DE77-48D0-8986-6C31287ECAA2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_fc430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1C272E6-7D78-433C-B668-EF0E810CC5BB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_m830_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "D692F4E6-059E-40F1-968A-59C27B2EC887"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_m830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3BE9AB9-8093-437E-9BF6-8BA0D5ECC7D3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_fc830_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "0CF35DC6-42AE-4F19-B3E3-759D85337BE5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_fc830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C060A4FA-B524-497C-AC27-3256ED048DF7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_t630_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.2",
+ "matchCriteriaId": "FAA229A2-7CB6-4716-B06E-0BAFFC414B43"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_t630:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F2B4062-E672-4F04-AA58-769DC546DA10"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r530_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.2",
+ "matchCriteriaId": "4A7F2D87-48D0-46B0-9801-88F8AB0A70EE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r530:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1ECA70D5-0884-4B74-92C0-DFBC8454FDAD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r430_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.2",
+ "matchCriteriaId": "71031E90-8FF5-45B2-AE14-5A2396128E57"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8EFF354-4534-480D-B52E-5FA575659E77"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_t430_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.2",
+ "matchCriteriaId": "60B41F7E-55D8-444A-B235-7CAF53847070"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_t430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B326C0B3-8CDF-4451-8B59-6E6EA3F1AB76"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_c6320_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.2",
+ "matchCriteriaId": "7DB3EE3A-DE08-407D-A96E-3747AB4F809E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_c6320:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB62B772-0492-490F-B971-93854DFD0CE0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_t130_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.19.1",
+ "matchCriteriaId": "ED44A834-81A2-4DDE-A862-B91664479D4B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_t130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FEFCD6F-3FEB-4505-9916-F64377D070BA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r230_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.19.1",
+ "matchCriteriaId": "28998BD5-6BCB-4633-90D4-804A3FA91614"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r230:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51598822-B949-4557-8205-C466E2CC2C6E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_t330_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.19.1",
+ "matchCriteriaId": "E4E882AF-0DC7-4F1C-AE9F-86E83DA69E1B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_t330:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "96FDFCC3-CEDA-4619-AA28-29D3D0688214"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r330_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.19.1",
+ "matchCriteriaId": "4CB02239-B3D0-47B8-91D9-487E0098254F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r330:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98D429E8-BA53-44BF-9C88-8CED370E2EF1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_r830_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.18.1",
+ "matchCriteriaId": "ABAD8868-8740-44D2-A1C5-8162C51A8C2E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_r830:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EFD80313-F625-40DE-82CC-15EBD2747991"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_m640_\\(pe_vrtx\\)_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "FC6BAF2F-4F09-4EA0-AE80-0188757CF2AD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_m640_\\(pe_vrtx\\):-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E44662C1-D438-452B-9669-8C1F8ADBABF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_m630_\\(pe_vrtx\\)_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "70F2EB74-3011-466D-BF32-F8D44E6BA5D6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_m630_\\(pe_vrtx\\):-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D90D2E26-AD95-4284-9007-50A60364A34C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:poweredge_m830_\\(pe_vrtx\\)_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "DA0A6758-6A0D-4EE1-88E7-E2C5D73DFBAD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:poweredge_m830_\\(pe_vrtx\\):-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE4FDBF0-B9FE-4A7C-93B7-FF9E0E63B424"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:dss_8440_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.0",
+ "matchCriteriaId": "5E01365B-5654-4176-9422-0F90AAA5F552"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:dss_8440:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "239C2103-C4BB-4C6A-8E09-C6F7D52024D3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:nx3230_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "C358D96F-0154-40AB-A369-4684542815E8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:nx3230:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "24D0E8F8-4EEB-4A1E-B853-3704140A86B8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:nx3330_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "93393744-0A0C-47AA-87FF-7BD8889E88E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:nx3330:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9428F53B-5740-4E8F-8569-ECE6CA4C137F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:nx430_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.19.1",
+ "matchCriteriaId": "4BA6A54A-12ED-4E9B-A5A8-C140EBB90621"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:nx430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "499C9492-AEAF-449B-A803-E16A684416B3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_storage_nx3240_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "4EC31A43-809F-4221-9234-AB4F87A22B2D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_storage_nx3240:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EFCDCB3C-4995-4211-8592-3D7F94098A26"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_storage_nx3340_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "665F2F2B-3911-4F91-BE01-463BF27B3B68"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_storage_nx3340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66F375D2-85E4-4994-AE90-99D25A50F9AD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_nx440_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.15.1",
+ "matchCriteriaId": "E8EEE051-B6FA-4777-8352-813AC6070496"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:nx440:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E4E3394-FEE3-4F25-963A-A687B96782AF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_xc_core_xc450_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "31A59A56-9044-46E2-909B-17DC3F168E1B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_xc_core_xc450:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FDCE2A0C-5A87-445A-8C60-FDED123CB158"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_xc_core_xc650_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "DFF46B83-8675-4143-A843-12320D53F35E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_xc_core_xc650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "995093A7-6545-49CB-8EC9-111BDB03F22A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_xc_core_xc750_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "F668032F-8C2A-4D64-ADC7-746160CA709D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_xc_core_xc750:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7D993733-A9F9-493A-A681-8BE661577E20"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_xc_core_xc750xa_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "DA26366F-76CE-4439-9ED4-208C0766AF7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_xc_core_xc750xa:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "340C43C5-1AC5-4EEF-A302-5F31613890EA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_xc_core_xc6520_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.12.1",
+ "matchCriteriaId": "AF06E2AE-EBF8-4354-A06D-88BFB7B83B69"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_xc_core_xc6520:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E10F545-A29C-411D-AA1E-AC45F9E67696"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_xc_core_xcxr2_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "2833616D-602C-4EDD-8937-56BAA7DB1E98"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_xc_core_xcxr2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FF8CC72-C32F-476D-86D3-CFF022185D76"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_xc_core_xc740xd2_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "DDC293DC-C90E-431E-82E3-411D30ACFBC4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_xc_core_xc740xd2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0127228B-FBC4-4C66-AFA1-749C151F79C5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_xc_core_xc7525_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.13.3",
+ "matchCriteriaId": "233A6D19-2145-4807-9587-FB947B1037AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_xc_core_xc7525:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA5F5A6D-1B59-464C-854E-6ECAA05E1217"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_xc_core_6420_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "51DB65B9-DA44-4D99-809F-044373D597B6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_xc_core_6420:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A54DBA6D-E506-4557-8659-1707F6C9D02F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_xc_core_xc640_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "D6425705-08FC-4B2E-BB7F-C817E21EE144"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_xc_core_xc640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8EE5A591-AFD4-43B0-9383-B2F306940679"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_xc_core_xc740xd_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "B2520B96-CEF0-4DF8-93A2-8A903F9940B4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_xc_core_xc740xd:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7AD7E6DE-4B9B-4C23-81A1-D8D52D2E4215"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:emc_xc_core_xc940_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.20.1",
+ "matchCriteriaId": "68C3F845-4413-4E35-AFC0-D30F8DD7E261"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:emc_xc_core_xc940:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A160D84-3C5D-4789-8AF3-B006A5956B3F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:xc_core_xc660_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "022170AF-65C3-4F62-9845-405EF34CD836"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:xc_core_xc660:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B63C230-DCE3-4B51-814F-D2C604943DA8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:xc_core_xc760_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.6",
+ "matchCriteriaId": "9A7E84E1-F13C-49AD-96C1-5791E8D7FEBE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:xc_core_xc760:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "21383EAC-7D09-414F-B314-1E9F54E605B5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:xc6320_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.2",
+ "matchCriteriaId": "27CC710D-32A8-4B8C-A022-2C30E7FCCF81"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:xc6320_hyperconverged_appliance:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65516802-9F50-45C0-B736-776233A29709"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:xc430_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.2",
+ "matchCriteriaId": "DA2E8392-8274-461A-80CA-C4342FF9F51C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:xc430_hyperconverged_appliance:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CBAB99EE-1539-4906-B742-7BD925A253FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:xc630_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "CCE79037-80F3-45B4-A946-171958C9AF44"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:xc630_hyperconverged_appliance:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "176F679F-5041-4F9D-890E-6D18E9E70245"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:xc730_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "BF63C026-73C9-434E-9FA6-6A0B1E063776"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:xc730_hyperconverged_appliance:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4FAEA1B-03D8-4528-A25B-5F490D24DCB2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dell:xc730xd_hyperconverged_appliance_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.18.1",
+ "matchCriteriaId": "454D8D4E-5F29-4917-98D1-BBC304FAF84D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dell:xc730xd_hyperconverged_appliance:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FF23CF1B-64EF-4FF2-B24D-CC8012F6FA78"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000219550/dsa-2023-361-security-update-for-dell-poweredge-server-bios-for-an-improper-privilege-management-security-vulnerability",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40627.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40627.json
index de121dd390a..d93542059f2 100644
--- a/CVE-2023/CVE-2023-406xx/CVE-2023-40627.json
+++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40627.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40627",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.397",
- "lastModified": "2023-12-14T09:15:41.397",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40628.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40628.json
index e291ad6c9b7..f6be63ebc67 100644
--- a/CVE-2023/CVE-2023-406xx/CVE-2023-40628.json
+++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40628.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40628",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.480",
- "lastModified": "2023-12-14T09:15:41.480",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40629.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40629.json
index 781ec1aac81..b1cc49d7cb7 100644
--- a/CVE-2023/CVE-2023-406xx/CVE-2023-40629.json
+++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40629.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40629",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.550",
- "lastModified": "2023-12-14T09:15:41.550",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40630.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40630.json
index 7386a901db5..94a26058c1e 100644
--- a/CVE-2023/CVE-2023-406xx/CVE-2023-40630.json
+++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40630.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40630",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.630",
- "lastModified": "2023-12-14T09:15:41.630",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40655.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40655.json
index 3af8e431e6c..b815fccdd71 100644
--- a/CVE-2023/CVE-2023-406xx/CVE-2023-40655.json
+++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40655.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40655",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.707",
- "lastModified": "2023-12-14T09:15:41.707",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40656.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40656.json
index 43b29c44b93..1a8eb82a9a5 100644
--- a/CVE-2023/CVE-2023-406xx/CVE-2023-40656.json
+++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40656.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40656",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.780",
- "lastModified": "2023-12-14T09:15:41.780",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40657.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40657.json
index 7d424d36eb3..34a637a7f1b 100644
--- a/CVE-2023/CVE-2023-406xx/CVE-2023-40657.json
+++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40657.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40657",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.850",
- "lastModified": "2023-12-14T09:15:41.850",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40658.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40658.json
index 9019bc4ce21..99201723f8d 100644
--- a/CVE-2023/CVE-2023-406xx/CVE-2023-40658.json
+++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40658.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40658",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.920",
- "lastModified": "2023-12-14T09:15:41.920",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40659.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40659.json
index 0abb66ee460..d1de7524aaf 100644
--- a/CVE-2023/CVE-2023-406xx/CVE-2023-40659.json
+++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40659.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40659",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.993",
- "lastModified": "2023-12-14T09:15:41.993",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-409xx/CVE-2023-40921.json b/CVE-2023/CVE-2023-409xx/CVE-2023-40921.json
index c1a9d685ce7..d31b1e68b3a 100644
--- a/CVE-2023/CVE-2023-409xx/CVE-2023-40921.json
+++ b/CVE-2023/CVE-2023-409xx/CVE-2023-40921.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40921",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T00:15:43.443",
- "lastModified": "2023-12-14T00:15:43.443",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41618.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41618.json
index fedd577b74c..7d29e4d6af6 100644
--- a/CVE-2023/CVE-2023-416xx/CVE-2023-41618.json
+++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41618.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41618",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T00:15:43.490",
- "lastModified": "2023-12-14T00:15:43.490",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41621.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41621.json
index a1a3ffbbac1..316172b1a08 100644
--- a/CVE-2023/CVE-2023-416xx/CVE-2023-41621.json
+++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41621.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41621",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-13T23:15:07.217",
- "lastModified": "2023-12-13T23:15:07.217",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41719.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41719.json
index 301adf205de..0e1419c3400 100644
--- a/CVE-2023/CVE-2023-417xx/CVE-2023-41719.json
+++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41719.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41719",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-12-14T02:15:12.460",
- "lastModified": "2023-12-14T02:15:12.460",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41720.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41720.json
index 499b418b169..d23c1ebfa01 100644
--- a/CVE-2023/CVE-2023-417xx/CVE-2023-41720.json
+++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41720.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41720",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-12-14T02:15:12.670",
- "lastModified": "2023-12-14T02:15:12.670",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42899.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42899.json
index ffa88363d8e..ecc40279a95 100644
--- a/CVE-2023/CVE-2023-428xx/CVE-2023-42899.json
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42899.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42899",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-12-12T01:15:11.733",
- "lastModified": "2023-12-13T03:15:47.640",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-12-14T14:07:42.957",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,63 +14,225 @@
"value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Sonoma 14.2, iOS 17.2 y iPadOS 17.2, watchOS 10.2, macOS Ventura 13.6.3, tvOS 17.2, iOS 16.7.3 y iPadOS 16.7.3, macOS Monterey 12.7.2. El procesamiento de una imagen puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "16.7.3",
+ "matchCriteriaId": "158A9F27-6C9F-4B9A-82EC-087E6B79E1F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0",
+ "versionEndExcluding": "17.2",
+ "matchCriteriaId": "D0997B97-8D18-41AC-85DD-3605A5DBCA35"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "16.7.3",
+ "matchCriteriaId": "F5968985-0FC1-4280-96AE-B0E55156B2C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0",
+ "versionEndExcluding": "17.2",
+ "matchCriteriaId": "C6DB531C-9534-461D-87D4-C2BA2BD1D9F6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "12.0.0",
+ "versionEndExcluding": "12.7.2",
+ "matchCriteriaId": "DA448C81-63DE-42EB-ADCC-C3A829C6D956"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.0",
+ "versionEndExcluding": "13.6.3",
+ "matchCriteriaId": "E270DF97-8603-42D8-A31C-FCD89A7D2F1E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.0",
+ "versionEndExcluding": "14.2",
+ "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.2",
+ "matchCriteriaId": "BE118A00-4F9E-496A-9408-88E2CD12339F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.2",
+ "matchCriteriaId": "1183933F-F52A-45A7-B118-FC8B8BDD5509"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/12",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/13",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/8",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214034",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214035",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214036",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214037",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214038",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214040",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214041",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42900.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42900.json
index 193b6df87f5..55b72f358da 100644
--- a/CVE-2023/CVE-2023-429xx/CVE-2023-42900.json
+++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42900.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42900",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-12-12T01:15:11.787",
- "lastModified": "2023-12-13T01:15:08.770",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-12-14T14:55:04.343",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,15 +14,77 @@
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.2. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.0",
+ "versionEndExcluding": "14.2",
+ "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214036",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42914.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42914.json
index db6302082f4..4da1b75daa0 100644
--- a/CVE-2023/CVE-2023-429xx/CVE-2023-42914.json
+++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42914.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42914",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-12-12T01:15:12.413",
- "lastModified": "2023-12-13T03:15:47.710",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-12-14T14:54:10.347",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,63 +14,225 @@
"value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Sonoma 14.2, iOS 17.2 y iPadOS 17.2, watchOS 10.2, macOS Ventura 13.6.3, tvOS 17.2, iOS 16.7.3 y iPadOS 16.7.3, macOS Monterey 12.7.2. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "16.7.3",
+ "matchCriteriaId": "158A9F27-6C9F-4B9A-82EC-087E6B79E1F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0",
+ "versionEndExcluding": "17.2",
+ "matchCriteriaId": "D0997B97-8D18-41AC-85DD-3605A5DBCA35"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "16.7.3",
+ "matchCriteriaId": "F5968985-0FC1-4280-96AE-B0E55156B2C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0",
+ "versionEndExcluding": "17.2",
+ "matchCriteriaId": "C6DB531C-9534-461D-87D4-C2BA2BD1D9F6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "12.0.0",
+ "versionEndExcluding": "12.7.2",
+ "matchCriteriaId": "DA448C81-63DE-42EB-ADCC-C3A829C6D956"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.0",
+ "versionEndExcluding": "13.6.3",
+ "matchCriteriaId": "E270DF97-8603-42D8-A31C-FCD89A7D2F1E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.0",
+ "versionEndExcluding": "14.2",
+ "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "17.2",
+ "matchCriteriaId": "780F2778-8AE1-4C48-8ADF-D4B7D44C3987"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.2",
+ "matchCriteriaId": "1183933F-F52A-45A7-B118-FC8B8BDD5509"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/12",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/13",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/8",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214034",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214035",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214036",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214037",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214038",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214040",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214041",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42919.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42919.json
index ba29e4b011b..ae288050db1 100644
--- a/CVE-2023/CVE-2023-429xx/CVE-2023-42919.json
+++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42919.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42919",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-12-12T01:15:12.473",
- "lastModified": "2023-12-13T03:15:47.923",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-12-14T14:08:16.317",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,55 +14,197 @@
"value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.2, iOS 17.2 y iPadOS 17.2, watchOS 10.2, macOS Ventura 13.6.3, iOS 16.7.3 y iPadOS 16.7.3, macOS Monterey 12.7.2. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "16.7.3",
+ "matchCriteriaId": "158A9F27-6C9F-4B9A-82EC-087E6B79E1F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0",
+ "versionEndExcluding": "17.2",
+ "matchCriteriaId": "D0997B97-8D18-41AC-85DD-3605A5DBCA35"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "16.7.3",
+ "matchCriteriaId": "F5968985-0FC1-4280-96AE-B0E55156B2C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0",
+ "versionEndExcluding": "17.2",
+ "matchCriteriaId": "C6DB531C-9534-461D-87D4-C2BA2BD1D9F6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "12.0.0",
+ "versionEndExcluding": "12.7.2",
+ "matchCriteriaId": "DA448C81-63DE-42EB-ADCC-C3A829C6D956"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.0",
+ "versionEndExcluding": "13.6.3",
+ "matchCriteriaId": "E270DF97-8603-42D8-A31C-FCD89A7D2F1E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.0",
+ "versionEndExcluding": "14.2",
+ "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/13",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/8",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214034",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214035",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214036",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214037",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214038",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214041",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42922.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42922.json
index 0ec230d8262..3a6e4ff5c1d 100644
--- a/CVE-2023/CVE-2023-429xx/CVE-2023-42922.json
+++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42922.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42922",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-12-12T01:15:12.530",
- "lastModified": "2023-12-13T01:15:09.910",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-12-14T14:05:30.140",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,47 +14,181 @@
"value": "Este problema se solucion\u00f3 mejorando la redacci\u00f3n de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Sonoma 14.2, iOS 17.2 y iPadOS 17.2, macOS Ventura 13.6.3, iOS 16.7.3 y iPadOS 16.7.3, macOS Monterey 12.7.2. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial de ubicaci\u00f3n."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "16.7.3",
+ "matchCriteriaId": "158A9F27-6C9F-4B9A-82EC-087E6B79E1F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0",
+ "versionEndExcluding": "17.2",
+ "matchCriteriaId": "D0997B97-8D18-41AC-85DD-3605A5DBCA35"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "16.7.3",
+ "matchCriteriaId": "F5968985-0FC1-4280-96AE-B0E55156B2C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0",
+ "versionEndExcluding": "17.2",
+ "matchCriteriaId": "C6DB531C-9534-461D-87D4-C2BA2BD1D9F6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "12.0.0",
+ "versionEndExcluding": "12.7.2",
+ "matchCriteriaId": "DA448C81-63DE-42EB-ADCC-C3A829C6D956"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.0",
+ "versionEndExcluding": "13.6.3",
+ "matchCriteriaId": "E270DF97-8603-42D8-A31C-FCD89A7D2F1E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.0",
+ "versionEndExcluding": "14.2",
+ "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/8",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214034",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214035",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214036",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214037",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT214038",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43042.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43042.json
index 15ba46bcfa5..99eb9d52d15 100644
--- a/CVE-2023/CVE-2023-430xx/CVE-2023-43042.json
+++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43042.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43042",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-14T01:15:07.897",
- "lastModified": "2023-12-14T01:15:07.897",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43583.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43583.json
index 7aac3b87db6..1616bce5a0d 100644
--- a/CVE-2023/CVE-2023-435xx/CVE-2023-43583.json
+++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43583.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43583",
"sourceIdentifier": "security@zoom.us",
"published": "2023-12-13T23:15:07.270",
- "lastModified": "2023-12-13T23:15:07.270",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43585.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43585.json
index 5b86e0906a0..171124a5bc9 100644
--- a/CVE-2023/CVE-2023-435xx/CVE-2023-43585.json
+++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43585.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43585",
"sourceIdentifier": "security@zoom.us",
"published": "2023-12-13T23:15:07.463",
- "lastModified": "2023-12-13T23:15:07.463",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43586.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43586.json
index a384f582c4e..4b643fe22e3 100644
--- a/CVE-2023/CVE-2023-435xx/CVE-2023-43586.json
+++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43586.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43586",
"sourceIdentifier": "security@zoom.us",
"published": "2023-12-13T23:15:07.660",
- "lastModified": "2023-12-13T23:15:07.660",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44709.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44709.json
index 361bfc999dc..938292f88e9 100644
--- a/CVE-2023/CVE-2023-447xx/CVE-2023-44709.json
+++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44709.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44709",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T06:15:42.743",
- "lastModified": "2023-12-14T06:15:42.743",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45166.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45166.json
index 98c4802e319..b67165ba457 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45166.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45166.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45166",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-13T23:15:07.850",
- "lastModified": "2023-12-13T23:15:07.850",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45170.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45170.json
index 2bcc21c2aa4..f421e402dd3 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45170.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45170.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45170",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-13T23:15:08.017",
- "lastModified": "2023-12-13T23:15:08.017",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45174.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45174.json
index 0b30fd331ef..95ad1e74ca4 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45174.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45174.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45174",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-13T23:15:08.180",
- "lastModified": "2023-12-13T23:15:08.180",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45182.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45182.json
new file mode 100644
index 00000000000..bc685bd3c86
--- /dev/null
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45182.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45182",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-12-14T14:15:42.333",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nIBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 is vulnerable to having its key for an encrypted password decoded. By somehow gaining access to the encrypted password, a local attacker could exploit this vulnerability to obtain the password to other systems. IBM X-Force ID: 268265.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-922"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268265",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7091942",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45184.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45184.json
index 4643b36d038..60506bf58cd 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45184.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45184.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45184",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-12-14T02:15:12.960",
- "lastModified": "2023-12-14T02:15:12.960",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45185.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45185.json
new file mode 100644
index 00000000000..f10f842a931
--- /dev/null
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45185.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45185",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-12-14T14:15:42.553",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 could allow an attacker to execute remote code. Due to improper authority checks the attacker could perform operations on the PC under the user's authority. IBM X-Force ID: 268273."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268273",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7091942",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45866.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45866.json
index 76031cea31d..779010c45ad 100644
--- a/CVE-2023/CVE-2023-458xx/CVE-2023-45866.json
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45866.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45866",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-08T06:15:45.690",
- "lastModified": "2023-12-13T01:15:11.003",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-14T14:47:57.930",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,47 +14,422 @@
"value": "Bluetooth HID Hosts in BlueZ pueden permitir que un dispositivo HID con funci\u00f3n perif\u00e9rica no autenticada inicie y establezca una conexi\u00f3n cifrada y acepte informes de teclado HID, lo que potencialmente permite la inyecci\u00f3n de mensajes HID cuando no se ha producido ninguna interacci\u00f3n del usuario en la funci\u00f3n central para autorizar dicho acceso. Un ejemplo de paquete afectado es bluez 5.64-0ubuntu1 en Ubuntu 22.04LTS. NOTA: en algunos casos, una mitigaci\u00f3n CVE-2020-0556 ya habr\u00eda solucionado este problema de hosts HID Bluetooth."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49413FF7-7910-4F74-B106-C3170612CB2A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:bluproducts:dash:3.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "025AACE2-2B3F-4ACD-B187-22ED8CDF8BAF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "691FA41B-C2CE-413F-ABB1-0B22CB322807"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:google:nexus_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25DB8689-116F-49B5-91F5-BCBA8854BD42"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:google:pixel_2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B76B2AD-52E2-41D2-82D7-557DC32E064F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:google:pixel_4a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8E49FC5D-ACC7-498F-88E9-293AB276CF63"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:google:pixel_6:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C27C4FD0-E67A-4D54-A00A-BDD59AAABB4F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:google:pixel_7:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C1347ED-56D0-4AF8-92D8-D4E427B5A1CA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:-:*:*:*",
+ "matchCriteriaId": "652F5027-4436-458C-84FD-7AD89B489BAA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:23.10:*:*:*:*:*:*:*",
+ "matchCriteriaId": "602CE21C-E1A9-4407-A504-CF4E58F596F5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:16.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "705DA51B-6A6E-422D-9A22-0DB86836EA0C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:apple:iphone_se:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91A20702-427E-4876-9DEE-E244F39A2E79"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:12.6.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15DDFC77-1ACB-4092-A1C3-623DE3CC980C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:apple:macbook_air:2017:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B649B9E4-91D9-4712-8E2A-9246E17D19CB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:13.3.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CECFF66D-DDF3-4492-85BE-79B57E7AAE9F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:apple:macbook_pro:m2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F1C6A9E0-6DDD-4E64-97B0-47C69A865C0E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "17.2",
+ "matchCriteriaId": "ED754E44-EDCF-4B0F-B662-E4C2687B4920"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "17.2",
+ "matchCriteriaId": "00FC779B-E45C-4B34-976F-490C38C22C67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.0",
+ "versionEndExcluding": "14.2",
+ "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://changelogs.ubuntu.com/changelogs/pool/main/b/bluez/bluez_5.64-0ubuntu1/changelog",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://bluetooth.com",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Not Applicable"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/profiles/input?id=25a471a83e02e1effb15d5a488b3f0085eaeb675",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
},
{
"url": "https://github.com/skysafe/reblog/tree/main/cve-2023-45866",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77YQQS5FXPYE6WBBZO3REFIRAUJHERFA/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2N2P5LMP3V7IJONALV2KOFL4NUU23CJ/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://support.apple.com/kb/HT214035",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/kb/HT214036",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46141.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46141.json
new file mode 100644
index 00000000000..c6d82f4b29d
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46141.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-46141",
+ "sourceIdentifier": "info@cert.vde.com",
+ "published": "2023-12-14T14:15:42.767",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Incorrect Permission Assignment for Critical Resource vulnerability in multiple products of the PHOENIX CONTACT classic line allow an remote unauthenticated attacker to gain full access of the affected device."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-732"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://cert.vde.com/en/advisories/VDE-2023-055/",
+ "source": "info@cert.vde.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46142.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46142.json
new file mode 100644
index 00000000000..e980fa837b3
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46142.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-46142",
+ "sourceIdentifier": "info@cert.vde.com",
+ "published": "2023-12-14T14:15:42.983",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A incorrect permission assignment for critical resource vulnerability in PLCnext products allows an remote attacker with low privileges to gain full access on the affected devices."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-732"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://https://cert.vde.com/en/advisories/VDE-2023-056/",
+ "source": "info@cert.vde.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46143.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46143.json
new file mode 100644
index 00000000000..d16c3a5cc24
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46143.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-46143",
+ "sourceIdentifier": "info@cert.vde.com",
+ "published": "2023-12-14T14:15:43.207",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-494"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://cert.vde.com/en/advisories/VDE-2023-057/",
+ "source": "info@cert.vde.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46144.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46144.json
new file mode 100644
index 00000000000..e5c971ad7ad
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46144.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-46144",
+ "sourceIdentifier": "info@cert.vde.com",
+ "published": "2023-12-14T14:15:43.447",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A download of code without integrity check vulnerability in PLCnext products allows an remote attacker with low privileges to compromise integrity on the affected engineering station and the connected devices."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.7,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-494"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://https://cert.vde.com/en/advisories/VDE-2023-056/",
+ "source": "info@cert.vde.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46348.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46348.json
index 1058e6d5ba0..b2e02b0d732 100644
--- a/CVE-2023/CVE-2023-463xx/CVE-2023-46348.json
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46348.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-46348",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T09:15:42.060",
- "lastModified": "2023-12-14T09:15:42.060",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46750.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46750.json
index 80f070f1931..c17f6bad2e8 100644
--- a/CVE-2023/CVE-2023-467xx/CVE-2023-46750.json
+++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46750.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-46750",
"sourceIdentifier": "security@apache.org",
"published": "2023-12-14T09:15:42.107",
- "lastModified": "2023-12-14T09:15:42.107",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47620.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47620.json
index 20a29f12e31..9c4351101c1 100644
--- a/CVE-2023/CVE-2023-476xx/CVE-2023-47620.json
+++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47620.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-47620",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-13T22:15:43.197",
- "lastModified": "2023-12-13T22:15:43.197",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Scrypted is a home video integration and automation platform. In versions 0.55.0 and prior, a reflected cross-site scripting vulnerability exists in the plugin-http.ts file via the `owner' and 'pkg` parameters. An attacker can run arbitrary JavaScript code. As of time of publication, no known patches are available."
+ },
+ {
+ "lang": "es",
+ "value": "Scrypted es una plataforma de automatizaci\u00f3n e integraci\u00f3n de v\u00eddeos dom\u00e9sticos. En las versiones 0.55.0 y anteriores, existe una vulnerabilidad de Cross-Site Scripting Reflejado en el archivo plugin-http.ts a trav\u00e9s de los par\u00e1metros `owner' y `pkg`. Un atacante puede ejecutar c\u00f3digo JavaScript arbitrario. Al momento de la publicaci\u00f3n, no hay parches conocidos disponibles."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47623.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47623.json
index 3ab20a38e5f..8b5ebc4dde4 100644
--- a/CVE-2023/CVE-2023-476xx/CVE-2023-47623.json
+++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47623.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-47623",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-13T22:15:43.417",
- "lastModified": "2023-12-13T22:15:43.417",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Scrypted is a home video integration and automation platform. In versions 0.55.0 and prior, a reflected cross-site scripting vulnerability exists in the login page via the `redirect_uri` parameter. By specifying a url with the javascript scheme (`javascript:`), an attacker can run arbitrary JavaScript code after the login. As of time of publication, no known patches are available."
+ },
+ {
+ "lang": "es",
+ "value": "Scrypted es una plataforma de automatizaci\u00f3n e integraci\u00f3n de v\u00eddeos dom\u00e9sticos. En las versiones 0.55.0 y anteriores, existe una vulnerabilidad de Cross-Site Scripting Reflejado en la p\u00e1gina de inicio de sesi\u00f3n a trav\u00e9s del par\u00e1metro `redirect_uri`. Al especificar una URL con el esquema javascript (`javascript:`), un atacante puede ejecutar c\u00f3digo JavaScript arbitrario despu\u00e9s de iniciar sesi\u00f3n. Al momento de la publicaci\u00f3n, no hay parches conocidos disponibles."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48084.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48084.json
index 95a9049bf26..78a4bfad02e 100644
--- a/CVE-2023/CVE-2023-480xx/CVE-2023-48084.json
+++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48084.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-48084",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T07:15:08.890",
- "lastModified": "2023-12-14T07:15:08.890",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48085.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48085.json
index 3a2e9d4c6a0..19e33124c75 100644
--- a/CVE-2023/CVE-2023-480xx/CVE-2023-48085.json
+++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48085.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-48085",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T07:15:09.033",
- "lastModified": "2023-12-14T07:15:09.033",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48631.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48631.json
new file mode 100644
index 00000000000..2d1ae4e6ad1
--- /dev/null
+++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48631.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-48631",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2023-12-14T13:15:54.250",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "@adobe/css-tools versions 4.3.1 and earlier are affected by an Improper Input Validation vulnerability that could result in a denial of service while attempting to parse CSS."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48676.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48676.json
new file mode 100644
index 00000000000..4acf03c66aa
--- /dev/null
+++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48676.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-48676",
+ "sourceIdentifier": "security@acronis.com",
+ "published": "2023-12-14T14:15:43.673",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 36943."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV30": [
+ {
+ "source": "security@acronis.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 3.3,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@acronis.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security-advisory.acronis.com/advisories/SEC-5905",
+ "source": "security@acronis.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48715.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48715.json
index 20bb4a698c0..ebc6fce1384 100644
--- a/CVE-2023/CVE-2023-487xx/CVE-2023-48715.json
+++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48715.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-48715",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-11T19:15:08.860",
- "lastModified": "2023-12-12T13:43:48.853",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-14T14:51:04.473",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -50,22 +70,66 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*",
+ "versionEndExcluding": "15.1-8",
+ "matchCriteriaId": "EBC945C2-F92B-4763-81DE-D233176CA6D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*",
+ "versionEndExcluding": "15.2.99.103",
+ "matchCriteriaId": "72217C7D-C8D3-4647-8B76-72BD84D3962A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "15.2",
+ "versionEndExcluding": "15.2-4",
+ "matchCriteriaId": "AE4D1FFC-AD00-4040-BD6A-3F32BBE7B72B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/Enalean/tuleap/commit/ea71ec7ee062aae8d1fa7a7325aaa759205c17d8",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3m7g-7787-wc68",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=ea71ec7ee062aae8d1fa7a7325aaa759205c17d8",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://tuleap.net/plugins/tracker/?aid=35143",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48925.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48925.json
index af91bfd7dea..b5309e4a536 100644
--- a/CVE-2023/CVE-2023-489xx/CVE-2023-48925.json
+++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48925.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-48925",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T09:15:42.193",
- "lastModified": "2023-12-14T09:15:42.193",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49355.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49355.json
index 6098204d2a7..19076e4166e 100644
--- a/CVE-2023/CVE-2023-493xx/CVE-2023-49355.json
+++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49355.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49355",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-11T07:15:07.003",
- "lastModified": "2023-12-11T12:20:45.887",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-14T14:47:05.647",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,19 +14,80 @@
"value": "decToString en decNumber/decNumber.c en jq 88f01a7 tiene una escritura fuera de los l\u00edmites de un byte a trav\u00e9s de la entrada \"[]-1.2e-1111111111\"."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jqlang:jq:1.7-37-g88f01a7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "13A0413C-DFC6-4B0A-95E2-466AB209E6D8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/jqlang/jq/blob/88f01a741c8d63c4d1b5bc3ef61520c6eb93edaa/src/decNumber/decNumber.c#L3764",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/jqlang/jq/tree/88f01a741c8d63c4d1b5bc3ef61520c6eb93edaa",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/linzc21/bug-reports/blob/main/reports/jq/1.7-37-g88f01a7/heap-buffer-overflow/CVE-2023-49355.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49646.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49646.json
index 21b3b39196a..e95fcba66c1 100644
--- a/CVE-2023/CVE-2023-496xx/CVE-2023-49646.json
+++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49646.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49646",
"sourceIdentifier": "security@zoom.us",
"published": "2023-12-13T23:15:08.357",
- "lastModified": "2023-12-13T23:15:08.357",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49707.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49707.json
index 3d30f2e1938..22affed310f 100644
--- a/CVE-2023/CVE-2023-497xx/CVE-2023-49707.json
+++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49707.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49707",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:42.240",
- "lastModified": "2023-12-14T09:15:42.240",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49708.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49708.json
index cb3c179d6f2..c3e7e741224 100644
--- a/CVE-2023/CVE-2023-497xx/CVE-2023-49708.json
+++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49708.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49708",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:42.310",
- "lastModified": "2023-12-14T09:15:42.310",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49836.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49836.json
new file mode 100644
index 00000000000..be9e697e0ba
--- /dev/null
+++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49836.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-49836",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-12-14T14:15:43.903",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brontobytes Cookie Bar allows Stored XSS.This issue affects Cookie Bar: from n/a through 2.0.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/cookie-bar/wordpress-cookie-bar-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49846.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49846.json
new file mode 100644
index 00000000000..273944f425e
--- /dev/null
+++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49846.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-49846",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-12-14T14:15:44.113",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paul Bearne Author Avatars List/Block allows Stored XSS.This issue affects Author Avatars List/Block: from n/a through 2.1.17.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/author-avatars/wordpress-author-avatars-list-block-plugin-2-1-16-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49847.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49847.json
new file mode 100644
index 00000000000..cb80cb2fbea
--- /dev/null
+++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49847.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-49847",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-12-14T14:15:44.320",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Twinpictures Annual Archive allows Stored XSS.This issue affects Annual Archive: from n/a through 1.6.0.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/anual-archive/wordpress-annual-archive-plugin-1-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49933.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49933.json
index 7e41ad8ece8..0abb43bcdb8 100644
--- a/CVE-2023/CVE-2023-499xx/CVE-2023-49933.json
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49933.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49933",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T05:15:08.810",
- "lastModified": "2023-12-14T05:15:08.810",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49934.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49934.json
index 8e8c12bd116..e80f851a60e 100644
--- a/CVE-2023/CVE-2023-499xx/CVE-2023-49934.json
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49934.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49934",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T05:15:10.023",
- "lastModified": "2023-12-14T05:15:10.023",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49935.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49935.json
index 5b4cee9ff29..92c89e09a75 100644
--- a/CVE-2023/CVE-2023-499xx/CVE-2023-49935.json
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49935.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49935",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T05:15:10.490",
- "lastModified": "2023-12-14T05:15:10.490",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49936.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49936.json
index 1c260e44371..a3924cdd187 100644
--- a/CVE-2023/CVE-2023-499xx/CVE-2023-49936.json
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49936.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49936",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T05:15:10.980",
- "lastModified": "2023-12-14T05:15:10.980",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49937.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49937.json
index 757bee6d094..9782202b541 100644
--- a/CVE-2023/CVE-2023-499xx/CVE-2023-49937.json
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49937.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49937",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T05:15:11.493",
- "lastModified": "2023-12-14T05:15:11.493",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49938.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49938.json
index b2c20146c60..345f668daa5 100644
--- a/CVE-2023/CVE-2023-499xx/CVE-2023-49938.json
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49938.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49938",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T05:15:11.890",
- "lastModified": "2023-12-14T05:15:11.890",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49964.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49964.json
index 4719ed29a3b..bf6dc7c8619 100644
--- a/CVE-2023/CVE-2023-499xx/CVE-2023-49964.json
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49964.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-49964",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-11T08:15:06.603",
- "lastModified": "2023-12-11T12:20:45.887",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-14T14:36:17.293",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,15 +14,74 @@
"value": "Se descubri\u00f3 un problema en Hyland Alfresco Community Edition hasta 7.2.0. Al insertar contenido malicioso en el archivo folder.get.html.ftl, un atacante puede realizar ataques SSTI (inyecci\u00f3n de plantilla del lado del servidor), que pueden aprovechar los objetos expuestos de FreeMarker para evitar las restricciones y lograr RCE (ejecuci\u00f3n remota de c\u00f3digo). NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2020-12873."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-74"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hyland:alfresco_content_services:*:*:*:*:community:*:*:*",
+ "versionEndIncluding": "7.2.0",
+ "matchCriteriaId": "D2B41FBE-7025-4B99-A7BD-746F95F022DA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/mbadanoiu/CVE-2023-49964",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.alfresco.com/products/community/download",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50368.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50368.json
new file mode 100644
index 00000000000..54388f58406
--- /dev/null
+++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50368.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-50368",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-12-14T14:15:44.530",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Averta Shortcodes and extra features for Phlox theme allows Stored XSS.This issue affects Shortcodes and extra features for Phlox theme: from n/a through 2.15.2.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/auxin-elements/wordpress-shortcodes-and-extra-features-for-phlox-theme-plugin-2-15-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50369.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50369.json
new file mode 100644
index 00000000000..7d6eca5b95b
--- /dev/null
+++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50369.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-50369",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-12-14T14:15:44.793",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alma Alma \u2013 Pay in installments or later for WooCommerce allows Stored XSS.This issue affects Alma \u2013 Pay in installments or later for WooCommerce: from n/a through 5.1.3.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/alma-gateway-for-woocommerce/wordpress-alma-plugin-5-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50370.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50370.json
new file mode 100644
index 00000000000..9aadcad2d73
--- /dev/null
+++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50370.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-50370",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-12-14T14:15:45.027",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh WPBakery Page Builder Addons by Livemesh allows Stored XSS.This issue affects WPBakery Page Builder Addons by Livemesh: from n/a through 3.5.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/addons-for-visual-composer/wordpress-livemesh-addons-for-wpbakery-page-builder-plugin-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50371.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50371.json
new file mode 100644
index 00000000000..bec9df87cc0
--- /dev/null
+++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50371.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-50371",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-12-14T13:15:54.790",
+ "lastModified": "2023-12-14T14:15:45.243",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Page Visit Counter Advanced Page Visit Counter \u2013 Most Wanted Analytics Plugin for WordPress allows Stored XSS.This issue affects Advanced Page Visit Counter \u2013 Most Wanted Analytics Plugin for WordPress: from n/a through 8.0.6.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/advanced-page-visit-counter/wordpress-advanced-page-visit-counter-plugin-8-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50429.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50429.json
index 7aea5c845bc..2ee02d30442 100644
--- a/CVE-2023/CVE-2023-504xx/CVE-2023-50429.json
+++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50429.json
@@ -2,19 +2,80 @@
"id": "CVE-2023-50429",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-09T22:15:07.177",
- "lastModified": "2023-12-10T11:50:56.433",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-14T14:33:52.857",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IzyBat Orange casiers before 20230803_1 allows getEnsemble.php ensemble SQL injection."
+ },
+ {
+ "lang": "es",
+ "value": "Los casiers IzyBat Orange anteriores a 20230803_1 permiten la inyecci\u00f3n SQL en conjunto getEnsemble.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:izybat:orange_casiers:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20230803_1",
+ "matchCriteriaId": "5D80BCAB-E7AD-4841-870D-0E475D563112"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-mc3w-rv8p-f9xf",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50709.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50709.json
index 0a7de3431c8..4f450fbe2fb 100644
--- a/CVE-2023/CVE-2023-507xx/CVE-2023-50709.json
+++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50709.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-50709",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-13T22:15:43.620",
- "lastModified": "2023-12-13T22:15:43.620",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:16.903",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cube is a semantic layer for building data applications. Prior to version 0.34.34, it is possible to make the entire Cube API unavailable by submitting a specially crafted request to a Cube API endpoint. The issue has been patched in `v0.34.34` and it's recommended that all users exposing Cube APIs to the public internet upgrade to the latest version to prevent service disruption.\nThere are currently no workaround for older versions, and the recommendation is to upgrade."
+ },
+ {
+ "lang": "es",
+ "value": "Cube es una capa sem\u00e1ntica para crear aplicaciones de datos. Antes de la versi\u00f3n 0.34.34, era posible hacer que toda la API de Cube no estuviera disponible enviando una solicitud especialmente manipulada a un endpoint de la API de Cube. El problema se solucion\u00f3 en `v0.34.34` y se recomienda que todos los usuarios que expongan las API de Cube a la Internet p\u00fablica actualicen a la \u00faltima versi\u00f3n para evitar interrupciones en el servicio. Actualmente no existe ninguna workaround para versiones anteriores y la recomendaci\u00f3n es actualizarlas."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5592.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5592.json
new file mode 100644
index 00000000000..b4bf9aceb81
--- /dev/null
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5592.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-5592",
+ "sourceIdentifier": "info@cert.vde.com",
+ "published": "2023-12-14T14:15:45.427",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to download and execute applications without integrity checks on the device which may result in a complete loss of integrity."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-494"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://cert.vde.com/en/advisories/VDE-2023-054/",
+ "source": "info@cert.vde.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5629.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5629.json
index 3935e6707cf..c2695d071ce 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5629.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5629.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5629",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2023-12-14T05:15:12.463",
- "lastModified": "2023-12-14T05:15:12.463",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5630.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5630.json
index a1a92be4d11..479ce719ac2 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5630.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5630.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5630",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2023-12-14T05:15:13.663",
- "lastModified": "2023-12-14T05:15:13.663",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6185.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6185.json
index d8df7947185..7831970209f 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6185.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6185.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6185",
"sourceIdentifier": "security@documentfoundation.org",
"published": "2023-12-11T12:15:07.037",
- "lastModified": "2023-12-13T03:15:48.383",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-14T13:51:13.473",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "security@documentfoundation.org",
"type": "Secondary",
@@ -38,18 +58,101 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.5.0",
+ "versionEndExcluding": "7.5.9",
+ "matchCriteriaId": "A3620339-BFEE-459E-937D-7F785CEE9C9F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.6.0",
+ "versionEndExcluding": "7.6.3",
+ "matchCriteriaId": "65A10E4B-F7DE-4FA8-8ACB-D1A54CCD408E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/",
- "source": "security@documentfoundation.org"
+ "source": "security@documentfoundation.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5574",
- "source": "security@documentfoundation.org"
+ "source": "security@documentfoundation.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185",
- "source": "security@documentfoundation.org"
+ "source": "security@documentfoundation.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6186.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6186.json
index 291e5731095..13f25342baf 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6186.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6186.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6186",
"sourceIdentifier": "security@documentfoundation.org",
"published": "2023-12-11T12:15:07.713",
- "lastModified": "2023-12-13T03:15:48.470",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-12-14T14:41:30.390",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "security@documentfoundation.org",
"type": "Secondary",
@@ -38,18 +58,101 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-281"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.5.0",
+ "versionEndExcluding": "7.5.9",
+ "matchCriteriaId": "A3620339-BFEE-459E-937D-7F785CEE9C9F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.6.0",
+ "versionEndExcluding": "7.6.4",
+ "matchCriteriaId": "5C255150-B48F-4F2A-8E7E-0C9D6CA3504D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/",
- "source": "security@documentfoundation.org"
+ "source": "security@documentfoundation.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5574",
- "source": "security@documentfoundation.org"
+ "source": "security@documentfoundation.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186",
- "source": "security@documentfoundation.org"
+ "source": "security@documentfoundation.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json
index a15043f14c5..cbc25ada2d7 100644
--- a/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-6275",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-24T15:15:07.783",
- "lastModified": "2023-12-12T18:15:23.363",
+ "lastModified": "2023-12-14T14:15:45.640",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input \"> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
+ "value": "A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input \"> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104."
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6407.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6407.json
index 5e21c11a3a2..c7c61306f6d 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6407.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6407.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6407",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2023-12-14T05:15:14.407",
- "lastModified": "2023-12-14T05:15:14.407",
- "vulnStatus": "Received",
+ "lastModified": "2023-12-14T13:52:06.780",
+ "vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6545.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6545.json
new file mode 100644
index 00000000000..f7eaa5e83dc
--- /dev/null
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6545.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-6545",
+ "sourceIdentifier": "info@cert.vde.com",
+ "published": "2023-12-14T14:15:45.753",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The package authelia-bhf included in Beckhoffs TwinCAT/BSD is prone to an open redirect that allows a remote unprivileged attacker to redirect a user to another site. This may have limited impact to integrity and does solely affect anthelia-bhf the Beckhoff fork of authelia."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "info@cert.vde.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-601"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://cert.vde.com/en/advisories/VDE-2023-067/",
+ "source": "info@cert.vde.com"
+ },
+ {
+ "url": "https://download.beckhoff.com/download/Document/product-security/Advisories/advisory-2023-001.pdf",
+ "source": "info@cert.vde.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6569.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6569.json
new file mode 100644
index 00000000000..c2d134d9553
--- /dev/null
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6569.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-6569",
+ "sourceIdentifier": "security@huntr.dev",
+ "published": "2023-12-14T13:15:55.020",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "External Control of File Name or Path in h2oai/h2o-3"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV30": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.3,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-73"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://huntr.com/bounties/a5d003dc-c23e-4c98-8dcf-35ba9252fa3c",
+ "source": "security@huntr.dev"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6570.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6570.json
new file mode 100644
index 00000000000..7d73c1ee8f6
--- /dev/null
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6570.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-6570",
+ "sourceIdentifier": "security@huntr.dev",
+ "published": "2023-12-14T13:15:55.230",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Server-Side Request Forgery (SSRF) in kubeflow/kubeflow"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV30": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.7,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://huntr.com/bounties/82d6e853-013b-4029-a23f-8b50ec56602a",
+ "source": "security@huntr.dev"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6571.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6571.json
new file mode 100644
index 00000000000..72734b08469
--- /dev/null
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6571.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-6571",
+ "sourceIdentifier": "security@huntr.dev",
+ "published": "2023-12-14T13:15:55.423",
+ "lastModified": "2023-12-14T13:51:59.903",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-site Scripting (XSS) - Reflected in kubeflow/kubeflow"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV30": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://huntr.com/bounties/f02781e7-2a53-4c66-aa32-babb16434632",
+ "source": "security@huntr.dev"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6572.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6572.json
new file mode 100644
index 00000000000..81b929c4d1e
--- /dev/null
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6572.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-6572",
+ "sourceIdentifier": "security@huntr.dev",
+ "published": "2023-12-14T14:15:46.013",
+ "lastModified": "2023-12-14T14:49:08.357",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository gradio-app/gradio prior to main."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV30": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 5.8
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/gradio-app/gradio/commit/5b5af1899dd98d63e1f9b48a93601c2db1f56520",
+ "source": "security@huntr.dev"
+ },
+ {
+ "url": "https://huntr.com/bounties/21d2ff0c-d43a-4afd-bb4d-049ee8da5b5c",
+ "source": "security@huntr.dev"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/README.md b/README.md
index 020e507f7e0..481e3072825 100644
--- a/README.md
+++ b/README.md
@@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
-2023-12-14T11:00:18.298653+00:00
+2023-12-14T15:00:26.600999+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
-2023-12-14T10:15:08.727000+00:00
+2023-12-14T14:55:04.343000+00:00
```
### Last Data Feed Release
@@ -29,44 +29,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
-233119
+233141
```
### CVEs added in the last Commit
-Recently added CVEs: `14`
+Recently added CVEs: `22`
-* [CVE-2023-40627](CVE-2023/CVE-2023-406xx/CVE-2023-40627.json) (`2023-12-14T09:15:41.397`)
-* [CVE-2023-40628](CVE-2023/CVE-2023-406xx/CVE-2023-40628.json) (`2023-12-14T09:15:41.480`)
-* [CVE-2023-40629](CVE-2023/CVE-2023-406xx/CVE-2023-40629.json) (`2023-12-14T09:15:41.550`)
-* [CVE-2023-40630](CVE-2023/CVE-2023-406xx/CVE-2023-40630.json) (`2023-12-14T09:15:41.630`)
-* [CVE-2023-40655](CVE-2023/CVE-2023-406xx/CVE-2023-40655.json) (`2023-12-14T09:15:41.707`)
-* [CVE-2023-40656](CVE-2023/CVE-2023-406xx/CVE-2023-40656.json) (`2023-12-14T09:15:41.780`)
-* [CVE-2023-40657](CVE-2023/CVE-2023-406xx/CVE-2023-40657.json) (`2023-12-14T09:15:41.850`)
-* [CVE-2023-40658](CVE-2023/CVE-2023-406xx/CVE-2023-40658.json) (`2023-12-14T09:15:41.920`)
-* [CVE-2023-40659](CVE-2023/CVE-2023-406xx/CVE-2023-40659.json) (`2023-12-14T09:15:41.993`)
-* [CVE-2023-46348](CVE-2023/CVE-2023-463xx/CVE-2023-46348.json) (`2023-12-14T09:15:42.060`)
-* [CVE-2023-46750](CVE-2023/CVE-2023-467xx/CVE-2023-46750.json) (`2023-12-14T09:15:42.107`)
-* [CVE-2023-48925](CVE-2023/CVE-2023-489xx/CVE-2023-48925.json) (`2023-12-14T09:15:42.193`)
-* [CVE-2023-49707](CVE-2023/CVE-2023-497xx/CVE-2023-49707.json) (`2023-12-14T09:15:42.240`)
-* [CVE-2023-49708](CVE-2023/CVE-2023-497xx/CVE-2023-49708.json) (`2023-12-14T09:15:42.310`)
+* [CVE-2023-48631](CVE-2023/CVE-2023-486xx/CVE-2023-48631.json) (`2023-12-14T13:15:54.250`)
+* [CVE-2023-6569](CVE-2023/CVE-2023-65xx/CVE-2023-6569.json) (`2023-12-14T13:15:55.020`)
+* [CVE-2023-6570](CVE-2023/CVE-2023-65xx/CVE-2023-6570.json) (`2023-12-14T13:15:55.230`)
+* [CVE-2023-6571](CVE-2023/CVE-2023-65xx/CVE-2023-6571.json) (`2023-12-14T13:15:55.423`)
+* [CVE-2023-50371](CVE-2023/CVE-2023-503xx/CVE-2023-50371.json) (`2023-12-14T13:15:54.790`)
+* [CVE-2023-0757](CVE-2023/CVE-2023-07xx/CVE-2023-0757.json) (`2023-12-14T14:15:42.083`)
+* [CVE-2023-45182](CVE-2023/CVE-2023-451xx/CVE-2023-45182.json) (`2023-12-14T14:15:42.333`)
+* [CVE-2023-45185](CVE-2023/CVE-2023-451xx/CVE-2023-45185.json) (`2023-12-14T14:15:42.553`)
+* [CVE-2023-46141](CVE-2023/CVE-2023-461xx/CVE-2023-46141.json) (`2023-12-14T14:15:42.767`)
+* [CVE-2023-46142](CVE-2023/CVE-2023-461xx/CVE-2023-46142.json) (`2023-12-14T14:15:42.983`)
+* [CVE-2023-46143](CVE-2023/CVE-2023-461xx/CVE-2023-46143.json) (`2023-12-14T14:15:43.207`)
+* [CVE-2023-46144](CVE-2023/CVE-2023-461xx/CVE-2023-46144.json) (`2023-12-14T14:15:43.447`)
+* [CVE-2023-48676](CVE-2023/CVE-2023-486xx/CVE-2023-48676.json) (`2023-12-14T14:15:43.673`)
+* [CVE-2023-49836](CVE-2023/CVE-2023-498xx/CVE-2023-49836.json) (`2023-12-14T14:15:43.903`)
+* [CVE-2023-49846](CVE-2023/CVE-2023-498xx/CVE-2023-49846.json) (`2023-12-14T14:15:44.113`)
+* [CVE-2023-49847](CVE-2023/CVE-2023-498xx/CVE-2023-49847.json) (`2023-12-14T14:15:44.320`)
+* [CVE-2023-50368](CVE-2023/CVE-2023-503xx/CVE-2023-50368.json) (`2023-12-14T14:15:44.530`)
+* [CVE-2023-50369](CVE-2023/CVE-2023-503xx/CVE-2023-50369.json) (`2023-12-14T14:15:44.793`)
+* [CVE-2023-50370](CVE-2023/CVE-2023-503xx/CVE-2023-50370.json) (`2023-12-14T14:15:45.027`)
+* [CVE-2023-5592](CVE-2023/CVE-2023-55xx/CVE-2023-5592.json) (`2023-12-14T14:15:45.427`)
+* [CVE-2023-6545](CVE-2023/CVE-2023-65xx/CVE-2023-6545.json) (`2023-12-14T14:15:45.753`)
+* [CVE-2023-6572](CVE-2023/CVE-2023-65xx/CVE-2023-6572.json) (`2023-12-14T14:15:46.013`)
### CVEs modified in the last Commit
-Recently modified CVEs: `11`
+Recently modified CVEs: `69`
-* [CVE-2023-34053](CVE-2023/CVE-2023-340xx/CVE-2023-34053.json) (`2023-12-14T10:15:07.520`)
-* [CVE-2023-41164](CVE-2023/CVE-2023-411xx/CVE-2023-41164.json) (`2023-12-14T10:15:07.630`)
-* [CVE-2023-41268](CVE-2023/CVE-2023-412xx/CVE-2023-41268.json) (`2023-12-14T10:15:07.723`)
-* [CVE-2023-45283](CVE-2023/CVE-2023-452xx/CVE-2023-45283.json) (`2023-12-14T10:15:07.947`)
-* [CVE-2023-46589](CVE-2023/CVE-2023-465xx/CVE-2023-46589.json) (`2023-12-14T10:15:08.053`)
-* [CVE-2023-46695](CVE-2023/CVE-2023-466xx/CVE-2023-46695.json) (`2023-12-14T10:15:08.170`)
-* [CVE-2023-46728](CVE-2023/CVE-2023-467xx/CVE-2023-46728.json) (`2023-12-14T10:15:08.277`)
-* [CVE-2023-46848](CVE-2023/CVE-2023-468xx/CVE-2023-46848.json) (`2023-12-14T10:15:08.390`)
-* [CVE-2023-50164](CVE-2023/CVE-2023-501xx/CVE-2023-50164.json) (`2023-12-14T10:15:08.530`)
-* [CVE-2023-5941](CVE-2023/CVE-2023-59xx/CVE-2023-5941.json) (`2023-12-14T10:15:08.630`)
-* [CVE-2023-5978](CVE-2023/CVE-2023-59xx/CVE-2023-5978.json) (`2023-12-14T10:15:08.727`)
+* [CVE-2023-43585](CVE-2023/CVE-2023-435xx/CVE-2023-43585.json) (`2023-12-14T13:52:16.903`)
+* [CVE-2023-43586](CVE-2023/CVE-2023-435xx/CVE-2023-43586.json) (`2023-12-14T13:52:16.903`)
+* [CVE-2023-45166](CVE-2023/CVE-2023-451xx/CVE-2023-45166.json) (`2023-12-14T13:52:16.903`)
+* [CVE-2023-45170](CVE-2023/CVE-2023-451xx/CVE-2023-45170.json) (`2023-12-14T13:52:16.903`)
+* [CVE-2023-45174](CVE-2023/CVE-2023-451xx/CVE-2023-45174.json) (`2023-12-14T13:52:16.903`)
+* [CVE-2023-49646](CVE-2023/CVE-2023-496xx/CVE-2023-49646.json) (`2023-12-14T13:52:16.903`)
+* [CVE-2023-21751](CVE-2023/CVE-2023-217xx/CVE-2023-21751.json) (`2023-12-14T13:52:16.903`)
+* [CVE-2023-40921](CVE-2023/CVE-2023-409xx/CVE-2023-40921.json) (`2023-12-14T13:52:16.903`)
+* [CVE-2023-41618](CVE-2023/CVE-2023-416xx/CVE-2023-41618.json) (`2023-12-14T13:52:16.903`)
+* [CVE-2023-31546](CVE-2023/CVE-2023-315xx/CVE-2023-31546.json) (`2023-12-14T13:52:16.903`)
+* [CVE-2023-43042](CVE-2023/CVE-2023-430xx/CVE-2023-43042.json) (`2023-12-14T13:52:16.903`)
+* [CVE-2023-41719](CVE-2023/CVE-2023-417xx/CVE-2023-41719.json) (`2023-12-14T13:52:16.903`)
+* [CVE-2023-42922](CVE-2023/CVE-2023-429xx/CVE-2023-42922.json) (`2023-12-14T14:05:30.140`)
+* [CVE-2023-42899](CVE-2023/CVE-2023-428xx/CVE-2023-42899.json) (`2023-12-14T14:07:42.957`)
+* [CVE-2023-42919](CVE-2023/CVE-2023-429xx/CVE-2023-42919.json) (`2023-12-14T14:08:16.317`)
+* [CVE-2023-6275](CVE-2023/CVE-2023-62xx/CVE-2023-6275.json) (`2023-12-14T14:15:45.640`)
+* [CVE-2023-50429](CVE-2023/CVE-2023-504xx/CVE-2023-50429.json) (`2023-12-14T14:33:52.857`)
+* [CVE-2023-49964](CVE-2023/CVE-2023-499xx/CVE-2023-49964.json) (`2023-12-14T14:36:17.293`)
+* [CVE-2023-6186](CVE-2023/CVE-2023-61xx/CVE-2023-6186.json) (`2023-12-14T14:41:30.390`)
+* [CVE-2023-49355](CVE-2023/CVE-2023-493xx/CVE-2023-49355.json) (`2023-12-14T14:47:05.647`)
+* [CVE-2023-45866](CVE-2023/CVE-2023-458xx/CVE-2023-45866.json) (`2023-12-14T14:47:57.930`)
+* [CVE-2023-32460](CVE-2023/CVE-2023-324xx/CVE-2023-32460.json) (`2023-12-14T14:48:51.007`)
+* [CVE-2023-48715](CVE-2023/CVE-2023-487xx/CVE-2023-48715.json) (`2023-12-14T14:51:04.473`)
+* [CVE-2023-42914](CVE-2023/CVE-2023-429xx/CVE-2023-42914.json) (`2023-12-14T14:54:10.347`)
+* [CVE-2023-42900](CVE-2023/CVE-2023-429xx/CVE-2023-42900.json) (`2023-12-14T14:55:04.343`)
## Download and Usage