Auto-Update: 2023-08-11T14:00:29.279460+00:00

This commit is contained in:
cad-safe-bot 2023-08-11 14:00:32 +00:00
parent 614e8cdb79
commit 4a893dbd7a
39 changed files with 1534 additions and 95 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-30939",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-08-24T19:15:21.093",
"lastModified": "2022-02-22T14:33:41.437",
"lastModified": "2023-08-11T12:58:06.453",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -179,8 +179,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.2",
"matchCriteriaId": "D428A75E-3714-4EAB-88EF-66DF6C763551"
"versionEndExcluding": "8.3",
"matchCriteriaId": "7A7245FB-6FBE-4C09-80F5-18504CA623B3"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-30947",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-08-24T19:15:21.507",
"lastModified": "2021-12-29T18:43:45.077",
"lastModified": "2023-08-11T12:57:50.873",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-Other"
}
]
}
@ -117,8 +117,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.2",
"matchCriteriaId": "D428A75E-3714-4EAB-88EF-66DF6C763551"
"versionEndExcluding": "8.3",
"matchCriteriaId": "7A7245FB-6FBE-4C09-80F5-18504CA623B3"
}
]
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-3403",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-08-11T13:15:09.740",
"lastModified": "2023-08-11T13:15:09.740",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** Duplicate, please use CVE-2023-28931 instead."
}
],
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35383",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:13.093",
"lastModified": "2023-08-08T18:33:10.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:38:48.340",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,115 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20107",
"matchCriteriaId": "0B6341EE-9F08-41F4-AAC9-69FCFD57AA29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6167",
"matchCriteriaId": "27D3DBDC-310E-41F1-A2B2-F0D3B09E1C25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4737",
"matchCriteriaId": "2CAFD7E2-955E-4169-8FE4-E4883C22F128"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.3324",
"matchCriteriaId": "B6873B3B-E106-4E56-B8EC-5D5A6EEEA5B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3324",
"matchCriteriaId": "72882593-8B44-4DF3-A6A1-8EFE2D7BBCF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2295",
"matchCriteriaId": "32AAA0B2-DF17-4CFA-851E-6B31C11DD38C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.2134",
"matchCriteriaId": "478EF06F-1EF8-45B5-981F-79159BFD709F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35383",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-36532",
"sourceIdentifier": "security@zoom.us",
"published": "2023-08-08T18:15:13.937",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:51:15.367",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Zoom Clients before 5.14.5 may allow an unauthenticated user to enable a denial of service via network access."
},
{
"lang": "es",
"value": "El desbordamiento del b\u00fafer en los clientes Zoom anteriores a la versi\u00f3n 5.14.5 puede permitir a un usuario no autenticado activar una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@zoom.us",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "security@zoom.us",
"type": "Secondary",
@ -46,10 +80,85 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*",
"versionEndExcluding": "5.14.5",
"matchCriteriaId": "FC3F07BF-C1ED-4CF9-B80E-B4373C97ED66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*",
"versionEndExcluding": "5.14.5",
"matchCriteriaId": "436C54EE-B52B-4F58-8883-E9D19501C08A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
"versionEndExcluding": "5.14.5",
"matchCriteriaId": "E041B2BA-CDF0-462A-95CD-8F23D8804A61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "5.14.5",
"matchCriteriaId": "72486794-B1B9-4035-BF0F-7BF9E9298CD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.14.5",
"matchCriteriaId": "D94CAE4E-F680-4E96-AAFB-FC53B695F210"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*",
"versionEndExcluding": "5.14.5",
"matchCriteriaId": "54090A11-AAB6-4796-9B61-84E6F8BD4471"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*",
"versionEndExcluding": "5.14.5",
"matchCriteriaId": "33C337B6-2098-4B95-8BDA-8FA009540E25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*",
"versionEndExcluding": "5.14.5",
"matchCriteriaId": "C48C0F49-74C1-4E81-81CC-08928A3F8853"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*",
"versionEndExcluding": "5.14.5",
"matchCriteriaId": "7241B980-9BFE-4675-852C-3C3515AA1874"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "5.14.5",
"matchCriteriaId": "7BEEBBF1-8759-4ED0-912F-29176263A1E3"
}
]
}
]
}
],
"references": [
{
"url": "https://explore.zoom.us/en/trust/security/security-bulletin/",
"source": "security@zoom.us"
"source": "security@zoom.us",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36533",
"sourceIdentifier": "security@zoom.us",
"published": "2023-08-08T18:15:14.037",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:42:42.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@zoom.us",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@zoom.us",
"type": "Secondary",
@ -46,10 +76,85 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*",
"versionEndExcluding": "5.14.7",
"matchCriteriaId": "A9D82780-92BD-436B-BB7E-F9C5F6E34FA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*",
"versionEndExcluding": "5.14.7",
"matchCriteriaId": "440DA9C2-5FF5-4D76-B123-2E3BA304538B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*",
"versionEndExcluding": "5.14.7",
"matchCriteriaId": "8C294644-DF3F-4BE2-A07A-D74082F9D66A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*",
"versionEndExcluding": "5.14.7",
"matchCriteriaId": "CCE1A3F9-2155-407A-8F35-9B543EB5CDD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "5.14.7",
"matchCriteriaId": "0CE354FE-9AF5-43B8-8368-5F4884EFE303"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*",
"versionEndExcluding": "5.14.7",
"matchCriteriaId": "28292A81-F997-45CE-9E71-856B86069B70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*",
"versionEndExcluding": "5.14.7",
"matchCriteriaId": "2BC978CC-E69B-4188-AF93-7AF6A1A7125D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*",
"versionEndExcluding": "5.14.7",
"matchCriteriaId": "E95C82D8-D362-452E-A51F-6FB1C96C1C4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*",
"versionEndExcluding": "5.14.7",
"matchCriteriaId": "3F6BCB1C-786B-44A4-97BB-DCF66C3E7C8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "5.14.7",
"matchCriteriaId": "D651A99D-AE3C-452F-A93F-FAA83FA12C71"
}
]
}
]
}
],
"references": [
{
"url": "https://explore.zoom.us/en/trust/security/security-bulletin/",
"source": "security@zoom.us"
"source": "security@zoom.us",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36534",
"sourceIdentifier": "security@zoom.us",
"published": "2023-08-08T18:15:14.127",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:55:20.393",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@zoom.us",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "security@zoom.us",
"type": "Secondary",
@ -46,10 +76,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "5.14.7",
"matchCriteriaId": "B7FE4BA5-8B53-4041-A006-9B4E44398A35"
}
]
}
]
}
],
"references": [
{
"url": "https://explore.zoom.us/en/trust/security/security-bulletin/",
"source": "security@zoom.us"
"source": "security@zoom.us",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36865",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:14.473",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:26:10.220",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,53 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*",
"matchCriteriaId": "0B3EF1E5-4757-4CFA-AE72-6BA876D3C9FD"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36865",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36866",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:14.543",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:29:47.997",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,53 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*",
"matchCriteriaId": "0B3EF1E5-4757-4CFA-AE72-6BA876D3C9FD"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36866",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36869",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:14.613",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:22:26.837",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,58 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:azure_devops_server:2019.0.1:-:*:*:*:*:*:*",
"matchCriteriaId": "FD677E75-F110-4C20-A408-0F0620D468BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:azure_devops_server:2019.1.2:-:*:*:*:*:*:*",
"matchCriteriaId": "E47C8F7E-E085-4C8C-A522-687F9B2C7B34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:azure_devops_server:2020.1.2:-:*:*:*:*:*:*",
"matchCriteriaId": "A8F7E9F3-B3DC-4161-AA99-DF4E17599868"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:azure_devops_server:2022.0.1:-:*:*:*:*:*:*",
"matchCriteriaId": "890F7135-DCF3-40A6-9FFE-F048EE7E1565"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36869",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36876",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:14.700",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:02:40.780",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36876",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36877",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:14.790",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:02:14.477",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:azure_hdinsights:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83A84196-1B0D-46F8-802F-064C6C80486D"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36877",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36881",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:14.877",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:01:54.670",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:azure_hdinsights:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83A84196-1B0D-46F8-802F-064C6C80486D"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36881",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36882",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:14.963",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:00:45.427",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,115 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20107",
"matchCriteriaId": "0B6341EE-9F08-41F4-AAC9-69FCFD57AA29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6167",
"matchCriteriaId": "27D3DBDC-310E-41F1-A2B2-F0D3B09E1C25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4737",
"matchCriteriaId": "2CAFD7E2-955E-4169-8FE4-E4883C22F128"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.3324",
"matchCriteriaId": "B6873B3B-E106-4E56-B8EC-5D5A6EEEA5B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3324",
"matchCriteriaId": "72882593-8B44-4DF3-A6A1-8EFE2D7BBCF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2295",
"matchCriteriaId": "32AAA0B2-DF17-4CFA-851E-6B31C11DD38C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.2134",
"matchCriteriaId": "478EF06F-1EF8-45B5-981F-79159BFD709F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36882",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36889",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:15.173",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:00:25.507",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,115 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20107",
"matchCriteriaId": "0B6341EE-9F08-41F4-AAC9-69FCFD57AA29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6167",
"matchCriteriaId": "27D3DBDC-310E-41F1-A2B2-F0D3B09E1C25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4737",
"matchCriteriaId": "2CAFD7E2-955E-4169-8FE4-E4883C22F128"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.3324",
"matchCriteriaId": "B6873B3B-E106-4E56-B8EC-5D5A6EEEA5B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3324",
"matchCriteriaId": "72882593-8B44-4DF3-A6A1-8EFE2D7BBCF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2295",
"matchCriteriaId": "32AAA0B2-DF17-4CFA-851E-6B31C11DD38C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.2134",
"matchCriteriaId": "478EF06F-1EF8-45B5-981F-79159BFD709F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36889",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36890",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:15.260",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:00:08.793",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,48 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"matchCriteriaId": "AC8BB33F-44C4-41FE-8B17-68E3C4B38142"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36890",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36891",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:15.367",
"lastModified": "2023-08-08T18:33:04.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T12:59:54.860",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,48 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"matchCriteriaId": "AC8BB33F-44C4-41FE-8B17-68E3C4B38142"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36891",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36892",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:15.457",
"lastModified": "2023-08-08T18:33:00.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:03:56.097",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,48 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"matchCriteriaId": "AC8BB33F-44C4-41FE-8B17-68E3C4B38142"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36892",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36893",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:15.543",
"lastModified": "2023-08-08T18:33:00.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:03:33.023",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,68 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF47B12-FC83-461C-8F18-A67CBDEFDE62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*",
"matchCriteriaId": "0B3EF1E5-4757-4CFA-AE72-6BA876D3C9FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:-:*:*:*",
"matchCriteriaId": "8D513A61-6427-4F85-AADF-99D6F223AF2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:rt:*:*:*",
"matchCriteriaId": "DDA98A76-D0D1-4BFA-BEAC-1C2313F7B859"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B1657C-0FF4-461A-BE2A-641275C4B0A0"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36893",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36894",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:15.633",
"lastModified": "2023-08-08T18:33:00.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:03:09.540",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,53 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"matchCriteriaId": "AC8BB33F-44C4-41FE-8B17-68E3C4B38142"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "F815EF1D-7B60-47BE-9AC2-2548F99F10E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36894",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36905",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:16.407",
"lastModified": "2023-08-08T18:33:00.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:16:38.847",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
@ -34,10 +54,102 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20107",
"matchCriteriaId": "8FD06E46-D04E-45A8-80CE-F46401595A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6167",
"matchCriteriaId": "27D3DBDC-310E-41F1-A2B2-F0D3B09E1C25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4737",
"matchCriteriaId": "2CAFD7E2-955E-4169-8FE4-E4883C22F128"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.3324",
"matchCriteriaId": "B6873B3B-E106-4E56-B8EC-5D5A6EEEA5B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3324",
"matchCriteriaId": "72882593-8B44-4DF3-A6A1-8EFE2D7BBCF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22000.2295",
"matchCriteriaId": "17CCD061-D397-42B4-A35C-59499EEC3DBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22000.2295",
"matchCriteriaId": "19850FAF-3452-40A0-8338-EA0FC9B61B4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22621.2134",
"matchCriteriaId": "6B81B5A3-92B9-43B0-8C33-DCE7B1900165"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22621.2134",
"matchCriteriaId": "E9050F06-6348-434B-A4A2-8FDE4A829E27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36905",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38154",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:22.073",
"lastModified": "2023-08-08T18:32:54.523",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-11T13:06:10.330",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,49 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4737",
"matchCriteriaId": "2CAFD7E2-955E-4169-8FE4-E4883C22F128"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38154",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3823",
"sourceIdentifier": "security@php.net",
"published": "2023-08-11T06:15:09.283",
"lastModified": "2023-08-11T06:15:09.283",
"vulnStatus": "Received",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3824",
"sourceIdentifier": "security@php.net",
"published": "2023-08-11T06:15:10.560",
"lastModified": "2023-08-11T06:15:10.560",
"vulnStatus": "Received",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-3864",
"sourceIdentifier": "security@snowsoftware.com",
"published": "2023-08-11T12:15:09.293",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Blind SQL injection in a service running in Snow Software license manager from version 8.0.0 up to and including 9.30.1 on Windows allows a logged in user with high privileges to inject SQL commands via the web portal."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@snowsoftware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@snowsoftware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://community.snowsoftware.com/s/feed/0D56M00009gUexuSAC",
"source": "security@snowsoftware.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2023-39417",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-11T13:15:09.870",
"lastModified": "2023-08-11T13:15:09.870",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or \"\"). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-39417",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228111",
"source": "secalert@redhat.com"
},
{
"url": "https://www.postgresql.org/support/security/CVE-2023-39417",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-39418",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-11T13:15:09.963",
"lastModified": "2023-08-11T13:15:09.963",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT. If UPDATE and SELECT policies forbid some rows that INSERT policies do not forbid, a user could store such rows."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-39418",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228112",
"source": "secalert@redhat.com"
},
{
"url": "https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=cb2ae5741f2458a474ed3c31458d242e678ff229",
"source": "secalert@redhat.com"
},
{
"url": "https://www.postgresql.org/support/security/CVE-2023-39418/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39553",
"sourceIdentifier": "security@apache.org",
"published": "2023-08-11T08:15:09.103",
"lastModified": "2023-08-11T08:15:09.103",
"vulnStatus": "Received",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-3937",
"sourceIdentifier": "security@snowsoftware.com",
"published": "2023-08-11T12:15:09.637",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross site scripting vulnerability in web portal in Snow Software License Manager from version 9.0.0 up to and including 9.30.1 on Windows allows an authenticated user with high privileges to trigger cross site scripting attack via the web browser"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@snowsoftware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@snowsoftware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://community.snowsoftware.com/s/feed/0D56M00009gUexuSAC",
"source": "security@snowsoftware.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40253",
"sourceIdentifier": "vuln@krcert.or.kr",
"published": "2023-08-11T06:15:10.673",
"lastModified": "2023-08-11T06:15:10.673",
"vulnStatus": "Received",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40254",
"sourceIdentifier": "vuln@krcert.or.kr",
"published": "2023-08-11T07:15:09.423",
"lastModified": "2023-08-11T07:15:09.423",
"vulnStatus": "Received",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40256",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-11T05:15:42.450",
"lastModified": "2023-08-11T05:15:42.450",
"vulnStatus": "Received",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40260",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-11T06:15:10.787",
"lastModified": "2023-08-11T06:15:10.787",
"vulnStatus": "Received",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40267",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-11T07:15:09.647",
"lastModified": "2023-08-11T07:15:09.647",
"vulnStatus": "Received",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4105",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-08-11T07:15:09.740",
"lastModified": "2023-08-11T07:15:09.740",
"vulnStatus": "Received",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4106",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-08-11T07:15:09.853",
"lastModified": "2023-08-11T07:15:09.853",
"vulnStatus": "Received",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4107",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-08-11T07:15:09.963",
"lastModified": "2023-08-11T07:15:09.963",
"vulnStatus": "Received",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4108",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-08-11T07:15:10.070",
"lastModified": "2023-08-11T07:15:10.070",
"vulnStatus": "Received",
"lastModified": "2023-08-11T12:58:22.393",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-11T12:00:28.920521+00:00
2023-08-11T14:00:29.279460+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-11T10:15:09.387000+00:00
2023-08-11T13:55:20.393000+00:00
```
### Last Data Feed Release
@ -29,20 +29,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
222442
222447
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `5`
* [CVE-2022-3403](CVE-2022/CVE-2022-34xx/CVE-2022-3403.json) (`2023-08-11T13:15:09.740`)
* [CVE-2023-3864](CVE-2023/CVE-2023-38xx/CVE-2023-3864.json) (`2023-08-11T12:15:09.293`)
* [CVE-2023-3937](CVE-2023/CVE-2023-39xx/CVE-2023-3937.json) (`2023-08-11T12:15:09.637`)
* [CVE-2023-39417](CVE-2023/CVE-2023-394xx/CVE-2023-39417.json) (`2023-08-11T13:15:09.870`)
* [CVE-2023-39418](CVE-2023/CVE-2023-394xx/CVE-2023-39418.json) (`2023-08-11T13:15:09.963`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `33`
* [CVE-2023-26309](CVE-2023/CVE-2023-263xx/CVE-2023-26309.json) (`2023-08-11T10:15:09.387`)
* [CVE-2023-40267](CVE-2023/CVE-2023-402xx/CVE-2023-40267.json) (`2023-08-11T12:58:22.393`)
* [CVE-2023-4105](CVE-2023/CVE-2023-41xx/CVE-2023-4105.json) (`2023-08-11T12:58:22.393`)
* [CVE-2023-4106](CVE-2023/CVE-2023-41xx/CVE-2023-4106.json) (`2023-08-11T12:58:22.393`)
* [CVE-2023-4107](CVE-2023/CVE-2023-41xx/CVE-2023-4107.json) (`2023-08-11T12:58:22.393`)
* [CVE-2023-4108](CVE-2023/CVE-2023-41xx/CVE-2023-4108.json) (`2023-08-11T12:58:22.393`)
* [CVE-2023-39553](CVE-2023/CVE-2023-395xx/CVE-2023-39553.json) (`2023-08-11T12:58:22.393`)
* [CVE-2023-36891](CVE-2023/CVE-2023-368xx/CVE-2023-36891.json) (`2023-08-11T12:59:54.860`)
* [CVE-2023-36890](CVE-2023/CVE-2023-368xx/CVE-2023-36890.json) (`2023-08-11T13:00:08.793`)
* [CVE-2023-36889](CVE-2023/CVE-2023-368xx/CVE-2023-36889.json) (`2023-08-11T13:00:25.507`)
* [CVE-2023-36882](CVE-2023/CVE-2023-368xx/CVE-2023-36882.json) (`2023-08-11T13:00:45.427`)
* [CVE-2023-36881](CVE-2023/CVE-2023-368xx/CVE-2023-36881.json) (`2023-08-11T13:01:54.670`)
* [CVE-2023-36877](CVE-2023/CVE-2023-368xx/CVE-2023-36877.json) (`2023-08-11T13:02:14.477`)
* [CVE-2023-36876](CVE-2023/CVE-2023-368xx/CVE-2023-36876.json) (`2023-08-11T13:02:40.780`)
* [CVE-2023-36894](CVE-2023/CVE-2023-368xx/CVE-2023-36894.json) (`2023-08-11T13:03:09.540`)
* [CVE-2023-36893](CVE-2023/CVE-2023-368xx/CVE-2023-36893.json) (`2023-08-11T13:03:33.023`)
* [CVE-2023-36892](CVE-2023/CVE-2023-368xx/CVE-2023-36892.json) (`2023-08-11T13:03:56.097`)
* [CVE-2023-38154](CVE-2023/CVE-2023-381xx/CVE-2023-38154.json) (`2023-08-11T13:06:10.330`)
* [CVE-2023-36905](CVE-2023/CVE-2023-369xx/CVE-2023-36905.json) (`2023-08-11T13:16:38.847`)
* [CVE-2023-36869](CVE-2023/CVE-2023-368xx/CVE-2023-36869.json) (`2023-08-11T13:22:26.837`)
* [CVE-2023-36865](CVE-2023/CVE-2023-368xx/CVE-2023-36865.json) (`2023-08-11T13:26:10.220`)
* [CVE-2023-36866](CVE-2023/CVE-2023-368xx/CVE-2023-36866.json) (`2023-08-11T13:29:47.997`)
* [CVE-2023-35383](CVE-2023/CVE-2023-353xx/CVE-2023-35383.json) (`2023-08-11T13:38:48.340`)
* [CVE-2023-36533](CVE-2023/CVE-2023-365xx/CVE-2023-36533.json) (`2023-08-11T13:42:42.633`)
* [CVE-2023-36532](CVE-2023/CVE-2023-365xx/CVE-2023-36532.json) (`2023-08-11T13:51:15.367`)
* [CVE-2023-36534](CVE-2023/CVE-2023-365xx/CVE-2023-36534.json) (`2023-08-11T13:55:20.393`)
## Download and Usage