Auto-Update: 2023-08-08T18:00:36.717706+00:00

This commit is contained in:
cad-safe-bot 2023-08-08 18:00:40 +00:00
parent 7d6c49e7bd
commit 4cab7a9e68
50 changed files with 4598 additions and 175 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1935",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-08-02T23:15:10.293",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:16:15.277",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,10 +76,151 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:emerson:roc809_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18077D47-9CE0-43BB-AEF2-C36B860068F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:emerson:roc809:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7BF172-D25F-4FA4-9F3D-076054DC2B6B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:emerson:roc827_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18ED69F7-497D-46F7-8658-E896BB97FE0E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:emerson:roc827:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DF43B58B-549D-49AC-A6CD-D56A51D514E4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:emerson:roc809l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC76BA18-6D73-4DF8-99F9-3746874B87CE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:emerson:roc809l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E166C44-92E0-4FF1-8E72-926B3DBFD685"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:emerson:roc827l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "025DE80C-CF6E-454E-B031-872BA0316ADE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:emerson:roc827l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC649A2-40AE-439F-AD70-70ADB3E8BC11"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:emerson:dl8000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF643AE-8D62-41EE-AEB5-414094F299E3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:emerson:dl8000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C771FBBB-0FEA-4BE4-A251-58C9EBD07E12"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-206-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26441",
"sourceIdentifier": "security@open-xchange.com",
"published": "2023-08-02T13:15:10.563",
"lastModified": "2023-08-03T16:15:10.797",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:21:21.010",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "security@open-xchange.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "security@open-xchange.com",
"type": "Secondary",
@ -46,22 +76,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_office:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.11",
"matchCriteriaId": "AD01E9AA-CCA9-4BD5-A12F-9CC9C977EACE"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Aug/8",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0003.json",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26442",
"sourceIdentifier": "security@open-xchange.com",
"published": "2023-08-02T13:15:10.640",
"lastModified": "2023-08-03T16:15:10.893",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:03:41.153",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.2,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.4,
"impactScore": 1.4
},
{
"source": "security@open-xchange.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
},
{
"source": "security@open-xchange.com",
"type": "Secondary",
@ -46,22 +76,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_office:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.11",
"matchCriteriaId": "AD01E9AA-CCA9-4BD5-A12F-9CC9C977EACE"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Aug/8",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0003.json",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf",
"source": "security@open-xchange.com"
"source": "security@open-xchange.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3180",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-03T15:15:29.960",
"lastModified": "2023-08-03T15:37:04.917",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T16:16:06.530",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -34,14 +54,51 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9E0C78-9678-4CEE-9389-962CF618A51F"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-3180",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222424",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,83 @@
"id": "CVE-2023-33364",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-03T16:15:11.813",
"lastModified": "2023-08-03T16:56:53.333",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:51:10.123",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An OS Command injection vulnerability exists in Suprema BioStar 2 before V2.9.1, which allows authenticated users to execute arbitrary OS commands on the BioStar 2 server."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:supremainc:biostar_2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.9.1",
"matchCriteriaId": "EB816219-172E-445F-9175-938D9B8A4602"
}
]
}
]
}
],
"references": [
{
"url": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33364",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://kb.supremainc.com/knowledge/doku.php?id=en:release_note_291",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,15 +2,38 @@
"id": "CVE-2023-3329",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-08-02T23:15:10.547",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:39:41.627",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SpiderControl SCADA Webserver versions 2.08 and prior are vulnerable to path traversal. An attacker with administrative privileges could overwrite files on the webserver using the HMI's upload file feature. This could create size zero files anywhere on the webserver, potentially overwriting system files and creating a denial-of-service condition."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
@ -23,10 +46,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:spidercontrol:scadawebserver:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.08",
"matchCriteriaId": "7EDC0851-BDA7-4653-8696-BBF08E93D6CB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-173-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3348",
"sourceIdentifier": "cna@cloudflare.com",
"published": "2023-08-03T15:15:30.227",
"lastModified": "2023-08-03T15:37:04.917",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:40:55.623",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
},
{
"source": "cna@cloudflare.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "cna@cloudflare.com",
"type": "Secondary",
@ -46,18 +76,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudflare:wrangler:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "3.1.1",
"matchCriteriaId": "0A4B04E1-8BCF-4AE4-B2F3-EF0C3CDA80F2"
}
]
}
]
}
],
"references": [
{
"url": "https://developers.cloudflare.com/workers/wrangler/",
"source": "cna@cloudflare.com"
"source": "cna@cloudflare.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/cloudflare/workers-sdk",
"source": "cna@cloudflare.com"
"source": "cna@cloudflare.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-8c93-4hch-xgxp",
"source": "cna@cloudflare.com"
"source": "cna@cloudflare.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-3386",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-08-08T16:15:13.343",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in a2 Camera Trap Tracking System allows SQL Injection.This issue affects Camera Trap Tracking System: before 3.1905.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0444",
"source": "cve@usom.gov.tr"
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,16 +2,49 @@
"id": "CVE-2023-3494",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2023-08-01T23:15:31.053",
"lastModified": "2023-08-02T13:30:39.550",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:13:14.613",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The fwctl driver implements a state machine which is executed when a bhyve guest accesses certain x86 I/O ports. The interface lets the guest copy a string into a buffer resident in the bhyve process' memory. A bug in the state machine implementation can result in a buffer overflowing when copying this string. Malicious, privileged software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root, mitigated by the capabilities assigned through the Capsicum sandbox available to the bhyve process.\n\n\n"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
},
{
"source": "secteam@freebsd.org",
"type": "Secondary",
@ -23,10 +56,95 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.1:-:*:*:*:*:*:*",
"matchCriteriaId": "DEEE6D52-27E4-438D-AE8D-7141320B5973"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:*",
"matchCriteriaId": "66364EA4-83B1-4597-8C18-D5633B361A9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:*",
"matchCriteriaId": "EF9292DD-EFB1-4B50-A941-7485D901489F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "EFB18F55-4F5C-4166-9A7E-6F6617179A90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p2:*:*:*:*:*:*",
"matchCriteriaId": "66E1C269-841F-489A-9A0A-5D145B417E0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p3:*:*:*:*:*:*",
"matchCriteriaId": "ECF1B567-F764-45F5-A793-BEA93720F952"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p4:*:*:*:*:*:*",
"matchCriteriaId": "DAFE3F33-2C57-4B52-B658-82572607BD8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p5:*:*:*:*:*:*",
"matchCriteriaId": "C925DF75-2785-44BD-91CA-66D29C296689"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p6:*:*:*:*:*:*",
"matchCriteriaId": "BCE2DAEC-81A5-49E9-B7E7-4F143FA6B3F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p7:*:*:*:*:*:*",
"matchCriteriaId": "7725D503-1437-4F90-B30C-007193D5F0E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.1:p8:*:*:*:*:*:*",
"matchCriteriaId": "49CDE3D8-2924-42B9-8778-C5A517F5451E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:*",
"matchCriteriaId": "B536EE52-ED49-4A85-BC9D-A27828D5A961"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:*",
"matchCriteriaId": "A87EFA20-DD6B-41C5-98FD-A29F67D2E732"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:*",
"matchCriteriaId": "2888B0C1-4D85-42EC-9696-03FAD0A9C28F"
}
]
}
]
}
],
"references": [
{
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-23:07.bhyve.asc",
"source": "secteam@freebsd.org"
"source": "secteam@freebsd.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-3522",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-08-08T16:15:13.470",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in a2 License Portal System allows SQL Injection.This issue affects License Portal System: before 1.48.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0445",
"source": "cve@usom.gov.tr"
}
]
}

View File

@ -2,27 +2,101 @@
"id": "CVE-2023-36082",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-03T01:15:11.437",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:40:37.243",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An isssue in GatesAIr Flexiva FM Transmitter/Exiter Fax 150W allows a remote attacker to gain privileges via the LDAP and SMTP credentials."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gatesair:flexiva_fax_150w_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "782C8D1B-B833-48F1-8B75-9E72F717219D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gatesair:flexiva_fax_150w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2AFEDE8-25AE-4D42-B725-E6F6AE63CB24"
}
]
}
]
}
],
"references": [
{
"url": "http://flexiva.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://gatesair.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://strik3r.gitbook.io/strik3r-blog/security-research/cves-pocs/cve-2023-36082",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36858",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-08-02T16:15:10.337",
"lastModified": "2023-08-02T16:55:04.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:13:55.697",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "f5sirt@f5.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "f5sirt@f5.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
@ -46,10 +66,84 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:access_policy_manager_clients:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.3",
"versionEndExcluding": "7.2.4.3",
"matchCriteriaId": "29E6882E-8F26-484E-A9A2-15710D4E6AAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.5",
"matchCriteriaId": "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "7522C760-7E07-406F-BF50-5656D5723C4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.9",
"matchCriteriaId": "FB129A0B-D821-4276-B616-BFAA02707B48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.3",
"matchCriteriaId": "607663E0-4D10-4C6C-8184-29A3EC921A83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0.0",
"versionEndIncluding": "17.1.0",
"matchCriteriaId": "15AAEA29-858C-4928-957A-D093CBC74094"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K000132563",
"source": "f5sirt@f5.com"
"source": "f5sirt@f5.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3618",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-12T15:15:09.060",
"lastModified": "2023-08-01T02:15:10.677",
"lastModified": "2023-08-08T17:15:09.717",
"vulnStatus": "Modified",
"descriptions": [
{
@ -37,19 +37,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-37646",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T17:15:09.440",
"lastModified": "2023-08-08T17:15:09.440",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in the CAB file extraction function of Bitberry File Opener v23.0 allows attackers to execute a directory traversal."
}
],
"metrics": {},
"references": [
{
"url": "http://bitberry.com",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/Decamark/868e88aa6aae6b8f4a1dc1991efb83ca",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3718",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-08-01T19:15:09.947",
"lastModified": "2023-08-02T13:30:45.017",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:08:55.400",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-alert@hpe.com",
"type": "Secondary",
@ -34,10 +54,189 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.10.0000",
"versionEndIncluding": "10.10.1050",
"matchCriteriaId": "04DE53FD-22EA-4BDF-97DD-AB8253F4F059"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.11.0000",
"versionEndIncluding": "10.11.1010",
"matchCriteriaId": "2649063A-E4A1-4548-877E-F1FAD3BBFC56"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_10000-48y6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D10D4824-3D75-4CD2-A541-D910B91FD560"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_4100i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C2B56C-203F-4290-BCE7-8BD751DF9CEF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6000_12g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E276AD3-DEBD-4BE5-A7E0-A2017E09ADC8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6000_24g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A51A5922-69A1-4594-B74F-27E62E455170"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6000_48g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D397073F-2A04-4B88-BC6D-5F3B5EEB00F8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF1DD310-3D31-4204-92E0-70C33EE44F08"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD1A83B-109B-4596-AE37-706751E2B57D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6200f_48g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9BC4F4F-5DF6-45D6-9039-BF06C5D53487"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6200m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1218AAA5-01ED-4D89-A7AE-A600356ABD46"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6200m_24g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D05337A1-9022-41DA-AFED-AE76FC39D3C6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6300m_24p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5172FB6C-C38E-4A5A-8C67-55B475C96B0A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6300m_48g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FF6C6CE-E842-420D-9C4C-54D4B4F85D14"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "790C5E7A-3405-4873-83E8-4D9C0FEC5E6D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_8320-32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "873275E0-0BF3-42A6-A88A-4A4CDCC98C37"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_8320-48p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65875CB1-A9A3-42CC-A14D-7AB4E985808A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_8325-32c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59B7E2D3-0B72-4A78-AEFA-F106FAD38156"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_8325-48y8c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E87A92B-4EE5-4235-A0DA-195F27841DBB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_8360-12c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC24E52-13C0-402F-9ABF-A1DE51719AEF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_8360-16y2c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76EF979E-061A-42A3-B161-B835E92ED180"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_8360-24xf2c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE04919C-9289-4FB3-938F-F8BB15EC6A74"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_8360-32y4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B630C64B-C474-477D-A80B-A0FB73ACCC49"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_8360-48xt4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53ABE8B8-A4F6-400B-A893-314BE24D06B8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_8360-48y6c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C44383CC-3751-455E-B1AB-39B16F40DC76"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_8400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B25A9CD2-5E5F-4BDB-8707-5D6941411A2B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hpe:aruba_cx_9300_32d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C595A15-BD04-45A3-A719-3DFB8DAB46E7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-010.txt",
"source": "security-alert@hpe.com"
"source": "security-alert@hpe.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38418",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-08-02T16:15:10.533",
"lastModified": "2023-08-02T16:55:04.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:14:37.997",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "f5sirt@f5.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -31,6 +31,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "f5sirt@f5.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -46,10 +66,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:access_policy_manager_clients:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.3",
"versionEndExcluding": "7.2.4.3",
"matchCriteriaId": "29E6882E-8F26-484E-A9A2-15710D4E6AAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "13.1.5",
"matchCriteriaId": "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "7522C760-7E07-406F-BF50-5656D5723C4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndIncluding": "15.1.9",
"matchCriteriaId": "FB129A0B-D821-4276-B616-BFAA02707B48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndIncluding": "16.1.3",
"matchCriteriaId": "607663E0-4D10-4C6C-8184-29A3EC921A83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0.0",
"versionEndIncluding": "17.1.0",
"matchCriteriaId": "15AAEA29-858C-4928-957A-D093CBC74094"
}
]
}
]
}
],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K000134746",
"source": "f5sirt@f5.com"
"source": "f5sirt@f5.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-38746",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-08-03T05:15:10.527",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:40:50.963",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read vulnerability/issue exists in CX-Programmer Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.80",
"matchCriteriaId": "2F64EAD4-2707-4BA2-B236-82400F127C58"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU93286117/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.ia.omron.com/product/vulnerability/OMSR-2023-005_en.pdf",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-38747",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-08-03T06:15:10.183",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:41:41.393",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow vulnerability exists in CX-Programmer Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.80",
"matchCriteriaId": "2F64EAD4-2707-4BA2-B236-82400F127C58"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU93286117/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.ia.omron.com/product/vulnerability/OMSR-2023-005_en.pdf",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-38748",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-08-03T06:15:10.477",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:41:51.407",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Use after free vulnerability exists in CX-Programmer Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.80",
"matchCriteriaId": "2F64EAD4-2707-4BA2-B236-82400F127C58"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU93286117/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.ia.omron.com/product/vulnerability/OMSR-2023-005_en.pdf",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38758",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:11.973",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in wger Project wger Workout Manager v.2.2.0a3 allows a remote attacker to gain privileges via the license_author field in the add-ingredient function in the templates/ingredients/view.html, models/ingredients.py, and views/ingredients.py components."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://wger.de",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38759",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:12.377",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Request Forgery (CSRF) vulnerability in wger Project wger Workout Manager 2.2.0a3 allows a remote attacker to gain privileges via the user-management feature in the gym/views/gym.py, templates/gym/reset_user_password.html, templates/user/overview.html, core/views/user.py, and templates/user/preferences.html, core/forms.py components."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://wger.de",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38760",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:12.440",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the role and gender parameters within the /QueryView.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38761",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:12.510",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to execute arbitrary code via a crafted payload to the systemSettings.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38762",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:12.580",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the friendmonths parameter within the /QueryView.php."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38763",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:12.703",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the FundRaiserID parameter within the /FundRaiserEditor.php endpoint."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38764",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:12.770",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the birthmonth and percls parameters within the /QueryView.php."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38765",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:12.833",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the membermonth parameter within the /QueryView.php."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38766",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:12.890",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to execute arbitrary code via a crafted payload to the PersonView.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38767",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:12.950",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the 'value' and 'custom' parameters within the /QueryView.php."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38768",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:13.023",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the PropertyID parameter within the /QueryView.php."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38769",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:13.087",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the searchstring and searchwhat parameters within the /QueryView.php."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38770",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:13.147",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the group parameter within the /QueryView.php."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38771",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:13.213",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the volopp parameter within the /QueryView.php."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-38773",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T16:15:13.277",
"lastModified": "2023-08-08T17:07:18.863",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the volopp1 and volopp2 parameters within the /QueryView.php."
}
],
"metrics": {},
"references": [
{
"url": "https://churchcrm.io/",
"source": "cve@mitre.org"
},
{
"url": "https://demo.churchcrm.io/master",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x72303074/CVE-Disclosures",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ChurchCRM/CRM/wiki",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,19 +2,77 @@
"id": "CVE-2023-39113",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-02T23:15:10.413",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:26:35.647",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ngiflib commit fb271 was discovered to contain a segmentation violation via the function \"main\" at gif2tag.c. This vulnerability is triggered when running the program gif2tga."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ngiflib_project:ngiflib:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023-07-14",
"matchCriteriaId": "C43BC274-1B97-4506-AE3C-3A4CDA665FF7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/miniupnp/ngiflib/issues/27",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -2,19 +2,77 @@
"id": "CVE-2023-39114",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-02T23:15:10.483",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:38:09.920",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ngiflib commit 84a75 was discovered to contain a segmentation violation via the function SDL_LoadAnimatedGif at ngiflibSDL.c. This vulnerability is triggered when running the program SDLaffgif."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ngiflib_project:ngiflib:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023-07-21",
"matchCriteriaId": "1C9F2466-AE90-49F4-8030-1331EEEB07DA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/miniupnp/ngiflib/issues/29",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-39532",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-08T17:15:09.607",
"lastModified": "2023-08-08T17:15:09.607",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SES is a JavaScript environment that allows safe execution of arbitrary programs in Compartments. In version 0.18.0 prior to 0.18.7, 0.17.0 prior to 0.17.1, 0.16.0 prior to 0.16.1, 0.15.0 prior to 0.15.24, 0.14.0 prior to 0.14.5, an 0.13.0 prior to 0.13.5, there is a hole in the confinement of guest applications under SES that may manifest as either the ability to exfiltrate information or execute arbitrary code depending on the configuration and implementation of the surrounding host.\n\nGuest program running inside a Compartment with as few as no endowments can gain access to the surrounding host\u2019s dynamic import by using dynamic import after the spread operator, like `{...import(arbitraryModuleSpecifier)}`.\n\nOn the web or in web extensions, a Content-Security-Policy following ordinary best practices likely mitigates both the risk of exfiltration and execution of arbitrary code, at least limiting the modules that the attacker can import to those that are already part of the application. However, without a Content-Security-Policy, dynamic import can be used to issue HTTP requests for either communication through the URL or for the execution of code reachable from that origin.\n\nWithin an XS worker, an attacker can use the host\u2019s module system to the extent that the host has been configured. This typically only allows access to module code on the host\u2019s file system and is of limited use to an attacker.\n\nWithin Node.js, the attacker gains access to Node.js\u2019s module system. Importing the powerful builtins is not useful except insofar as there are side-effects and tempered because dynamic import returns a promise. Spreading a promise into an object renders the promises useless. However, Node.js allows importing data URLs, so this is a clear path to arbitrary execution.\n\nVersions 0.18.7, 0.17.1, 0.16.1, 0.15.24, 0.14.5, and 0.13.5 contain a patch for this issue. Some workarounds are available. On the web, providing a suitably constrained Content-Security-Policy mitigates most of the threat. With XS, building a binary that lacks the ability to load modules at runtime mitigates the entirety of the threat. That will look like an implementation of `fxFindModule` in a file like `xsPlatform.c` that calls `fxRejectModuleFile`."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/endojs/endo/commit/fc90c6429604dc79ce8e3355e236ccce2bada041",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/endojs/endo/security/advisories/GHSA-9c4h-3f7h-322r",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-39551",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-04T19:15:10.390",
"lastModified": "2023-08-06T12:01:17.683",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:22:39.600",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "PHPGurukul Online Security Guards Hiring System v.1.0 is vulnerable to SQL Injection via osghs/admin/search.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:online_security_guards_hiring_system_project:online_security_guards_hiring_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F2B06F6-4201-4A29-8956-1AF54C24159A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/Online%20Security%20Guards%20Hiring%20System%201.0.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-39552",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-04T19:15:10.547",
"lastModified": "2023-08-06T12:01:17.683",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:44:27.907",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "PHPGurukul Online Security Guards Hiring System v.1.0 is vulnerable to Cross-Site Scripting (XSS)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:online_security_guards_hiring_system_project:online_security_guards_hiring_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F2B06F6-4201-4A29-8956-1AF54C24159A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/Online%20Security%20Guards%20Hiring%20System%201.0.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3932",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-08-03T05:15:10.723",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:41:16.460",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "cve@gitlab.com",
"type": "Secondary",
@ -46,14 +76,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "13.12.0",
"versionEndExcluding": "16.0.8",
"matchCriteriaId": "91EEA705-42BA-4BFE-A96D-185938DB0FF4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.3",
"matchCriteriaId": "B6C23B24-069B-4665-9CA6-8D40AC5DDA91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "16.2.0",
"versionEndExcluding": "16.2.2",
"matchCriteriaId": "4E16595C-02B7-4143-8991-E47770CCA461"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/417594",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://hackerone.com/reports/2057633",
"source": "cve@gitlab.com"
"source": "cve@gitlab.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4118",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T08:15:10.717",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:42:15.643",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:iscute:cute_http_file_server:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6646F1C-FEF9-4361-94C8-1EEB8D9E1CB3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/goodric/chfs",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.235965",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.235965",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4119",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T09:15:09.697",
"lastModified": "2023-08-03T16:15:12.893",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:45:34.960",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:creativeitem:academy_lms:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0712CDA8-7C25-4A13-933D-08FEA6A7E9EE"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/173941/Academy-LMS-6.0-Cross-Site-Scripting.html",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?ctiid.235966",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.235966",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4120",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T09:15:10.210",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:46:50.760",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,49 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:byzoro:smart_s85f:*:*:*:*:*:*:*:*",
"versionEndIncluding": "20230722",
"matchCriteriaId": "E35E961A-A047-491C-99E6-5B03F841A2D3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/RCEraser/cve/blob/main/rce.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.235967",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.235967",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4121",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T10:15:09.790",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:47:31.630",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,49 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:byzoro:smart_s85f:*:*:*:*:*:*:*:*",
"versionEndIncluding": "20230722",
"matchCriteriaId": "E35E961A-A047-491C-99E6-5B03F841A2D3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/torres14852/cve/blob/main/upload.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.235968",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.235968",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4124",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-08-03T04:15:11.340",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T16:25:23.753",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -46,14 +68,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:answer:answer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.1",
"matchCriteriaId": "0025E76C-4BCF-464D-BF24-51B8D2FFE76F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/answerdev/answer/commit/964195fd859ee5d7171fac847374dfa31893e793",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.dev/bounties/2c684f99-d181-4106-8ee2-64a76ae6a348",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4125",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-08-03T04:15:11.477",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T16:36:43.700",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -36,7 +58,7 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,16 +66,52 @@
"value": "CWE-521"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-521"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:answer:answer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.0",
"matchCriteriaId": "DA293827-A320-409B-9F14-132EB52BA0C8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/answerdev/answer/commit/7d23b17cdbbefcd2e7b5c3150f0b5ec908dc835f",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.dev/bounties/85bfd18f-8d3b-4154-8b7b-1f8fcf704e28",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4126",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-08-03T04:15:11.620",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T16:51:35.293",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -46,14 +68,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:answer:answer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.0",
"matchCriteriaId": "DA293827-A320-409B-9F14-132EB52BA0C8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/answerdev/answer/commit/4f468b58d0dea51290bfbdd3e96332b0014c8730",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.dev/bounties/7f50bf1c-bcb9-46ca-8cec-211493d280c5",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4127",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-08-03T04:15:11.753",
"lastModified": "2023-08-03T12:40:03.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T17:01:00.177",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -46,14 +68,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:answer:answer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.1",
"matchCriteriaId": "0025E76C-4BCF-464D-BF24-51B8D2FFE76F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/answerdev/answer/commit/47661dc8a356ce6aa7793f1bd950399292180182",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-08T16:01:35.968767+00:00
2023-08-08T18:00:36.717706+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-08T15:58:49.607000+00:00
2023-08-08T17:51:10.123000+00:00
```
### Last Data Feed Release
@ -29,52 +29,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
221985
222004
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `19`
* [CVE-2023-24698](CVE-2023/CVE-2023-246xx/CVE-2023-24698.json) (`2023-08-08T15:15:09.977`)
* [CVE-2023-2423](CVE-2023/CVE-2023-24xx/CVE-2023-2423.json) (`2023-08-08T15:15:10.163`)
* [CVE-2023-33756](CVE-2023/CVE-2023-337xx/CVE-2023-33756.json) (`2023-08-08T15:15:10.270`)
* [CVE-2023-36136](CVE-2023/CVE-2023-361xx/CVE-2023-36136.json) (`2023-08-08T15:15:10.337`)
* [CVE-2023-36306](CVE-2023/CVE-2023-363xx/CVE-2023-36306.json) (`2023-08-08T15:15:10.400`)
* [CVE-2023-3651](CVE-2023/CVE-2023-36xx/CVE-2023-3651.json) (`2023-08-08T15:15:10.587`)
* [CVE-2023-3652](CVE-2023/CVE-2023-36xx/CVE-2023-3652.json) (`2023-08-08T15:15:10.700`)
* [CVE-2023-3653](CVE-2023/CVE-2023-36xx/CVE-2023-3653.json) (`2023-08-08T15:15:10.817`)
* [CVE-2023-38758](CVE-2023/CVE-2023-387xx/CVE-2023-38758.json) (`2023-08-08T16:15:11.973`)
* [CVE-2023-38759](CVE-2023/CVE-2023-387xx/CVE-2023-38759.json) (`2023-08-08T16:15:12.377`)
* [CVE-2023-38760](CVE-2023/CVE-2023-387xx/CVE-2023-38760.json) (`2023-08-08T16:15:12.440`)
* [CVE-2023-38761](CVE-2023/CVE-2023-387xx/CVE-2023-38761.json) (`2023-08-08T16:15:12.510`)
* [CVE-2023-38762](CVE-2023/CVE-2023-387xx/CVE-2023-38762.json) (`2023-08-08T16:15:12.580`)
* [CVE-2023-38763](CVE-2023/CVE-2023-387xx/CVE-2023-38763.json) (`2023-08-08T16:15:12.703`)
* [CVE-2023-38764](CVE-2023/CVE-2023-387xx/CVE-2023-38764.json) (`2023-08-08T16:15:12.770`)
* [CVE-2023-38765](CVE-2023/CVE-2023-387xx/CVE-2023-38765.json) (`2023-08-08T16:15:12.833`)
* [CVE-2023-38766](CVE-2023/CVE-2023-387xx/CVE-2023-38766.json) (`2023-08-08T16:15:12.890`)
* [CVE-2023-38767](CVE-2023/CVE-2023-387xx/CVE-2023-38767.json) (`2023-08-08T16:15:12.950`)
* [CVE-2023-38768](CVE-2023/CVE-2023-387xx/CVE-2023-38768.json) (`2023-08-08T16:15:13.023`)
* [CVE-2023-38769](CVE-2023/CVE-2023-387xx/CVE-2023-38769.json) (`2023-08-08T16:15:13.087`)
* [CVE-2023-38770](CVE-2023/CVE-2023-387xx/CVE-2023-38770.json) (`2023-08-08T16:15:13.147`)
* [CVE-2023-38771](CVE-2023/CVE-2023-387xx/CVE-2023-38771.json) (`2023-08-08T16:15:13.213`)
* [CVE-2023-38773](CVE-2023/CVE-2023-387xx/CVE-2023-38773.json) (`2023-08-08T16:15:13.277`)
* [CVE-2023-3386](CVE-2023/CVE-2023-33xx/CVE-2023-3386.json) (`2023-08-08T16:15:13.343`)
* [CVE-2023-3522](CVE-2023/CVE-2023-35xx/CVE-2023-3522.json) (`2023-08-08T16:15:13.470`)
* [CVE-2023-37646](CVE-2023/CVE-2023-376xx/CVE-2023-37646.json) (`2023-08-08T17:15:09.440`)
* [CVE-2023-39532](CVE-2023/CVE-2023-395xx/CVE-2023-39532.json) (`2023-08-08T17:15:09.607`)
### CVEs modified in the last Commit
Recently modified CVEs: `28`
Recently modified CVEs: `30`
* [CVE-2023-39144](CVE-2023/CVE-2023-391xx/CVE-2023-39144.json) (`2023-08-08T14:03:16.777`)
* [CVE-2023-22277](CVE-2023/CVE-2023-222xx/CVE-2023-22277.json) (`2023-08-08T14:23:20.550`)
* [CVE-2023-22317](CVE-2023/CVE-2023-223xx/CVE-2023-22317.json) (`2023-08-08T14:23:23.080`)
* [CVE-2023-22314](CVE-2023/CVE-2023-223xx/CVE-2023-22314.json) (`2023-08-08T14:23:35.113`)
* [CVE-2023-4133](CVE-2023/CVE-2023-41xx/CVE-2023-4133.json) (`2023-08-08T14:29:03.127`)
* [CVE-2023-37364](CVE-2023/CVE-2023-373xx/CVE-2023-37364.json) (`2023-08-08T14:29:59.697`)
* [CVE-2023-4132](CVE-2023/CVE-2023-41xx/CVE-2023-4132.json) (`2023-08-08T14:30:07.910`)
* [CVE-2023-37498](CVE-2023/CVE-2023-374xx/CVE-2023-37498.json) (`2023-08-08T14:40:20.647`)
* [CVE-2023-34196](CVE-2023/CVE-2023-341xx/CVE-2023-34196.json) (`2023-08-08T14:42:28.803`)
* [CVE-2023-37497](CVE-2023/CVE-2023-374xx/CVE-2023-37497.json) (`2023-08-08T14:49:09.140`)
* [CVE-2023-38958](CVE-2023/CVE-2023-389xx/CVE-2023-38958.json) (`2023-08-08T14:51:10.603`)
* [CVE-2023-36480](CVE-2023/CVE-2023-364xx/CVE-2023-36480.json) (`2023-08-08T15:15:10.467`)
* [CVE-2023-38330](CVE-2023/CVE-2023-383xx/CVE-2023-38330.json) (`2023-08-08T15:27:15.263`)
* [CVE-2023-37551](CVE-2023/CVE-2023-375xx/CVE-2023-37551.json) (`2023-08-08T15:42:44.287`)
* [CVE-2023-37552](CVE-2023/CVE-2023-375xx/CVE-2023-37552.json) (`2023-08-08T15:43:03.593`)
* [CVE-2023-37553](CVE-2023/CVE-2023-375xx/CVE-2023-37553.json) (`2023-08-08T15:43:11.357`)
* [CVE-2023-37554](CVE-2023/CVE-2023-375xx/CVE-2023-37554.json) (`2023-08-08T15:43:19.910`)
* [CVE-2023-37556](CVE-2023/CVE-2023-375xx/CVE-2023-37556.json) (`2023-08-08T15:43:29.180`)
* [CVE-2023-37557](CVE-2023/CVE-2023-375xx/CVE-2023-37557.json) (`2023-08-08T15:43:40.077`)
* [CVE-2023-37555](CVE-2023/CVE-2023-375xx/CVE-2023-37555.json) (`2023-08-08T15:43:45.413`)
* [CVE-2023-3663](CVE-2023/CVE-2023-36xx/CVE-2023-3663.json) (`2023-08-08T15:43:48.747`)
* [CVE-2023-37558](CVE-2023/CVE-2023-375xx/CVE-2023-37558.json) (`2023-08-08T15:43:58.523`)
* [CVE-2023-37559](CVE-2023/CVE-2023-375xx/CVE-2023-37559.json) (`2023-08-08T15:44:06.563`)
* [CVE-2023-3662](CVE-2023/CVE-2023-36xx/CVE-2023-3662.json) (`2023-08-08T15:44:56.483`)
* [CVE-2023-25600](CVE-2023/CVE-2023-256xx/CVE-2023-25600.json) (`2023-08-08T15:58:49.607`)
* [CVE-2023-4127](CVE-2023/CVE-2023-41xx/CVE-2023-4127.json) (`2023-08-08T17:01:00.177`)
* [CVE-2023-26442](CVE-2023/CVE-2023-264xx/CVE-2023-26442.json) (`2023-08-08T17:03:41.153`)
* [CVE-2023-3718](CVE-2023/CVE-2023-37xx/CVE-2023-3718.json) (`2023-08-08T17:08:55.400`)
* [CVE-2023-3494](CVE-2023/CVE-2023-34xx/CVE-2023-3494.json) (`2023-08-08T17:13:14.613`)
* [CVE-2023-36858](CVE-2023/CVE-2023-368xx/CVE-2023-36858.json) (`2023-08-08T17:13:55.697`)
* [CVE-2023-38418](CVE-2023/CVE-2023-384xx/CVE-2023-38418.json) (`2023-08-08T17:14:37.997`)
* [CVE-2023-3618](CVE-2023/CVE-2023-36xx/CVE-2023-3618.json) (`2023-08-08T17:15:09.717`)
* [CVE-2023-1935](CVE-2023/CVE-2023-19xx/CVE-2023-1935.json) (`2023-08-08T17:16:15.277`)
* [CVE-2023-26441](CVE-2023/CVE-2023-264xx/CVE-2023-26441.json) (`2023-08-08T17:21:21.010`)
* [CVE-2023-39551](CVE-2023/CVE-2023-395xx/CVE-2023-39551.json) (`2023-08-08T17:22:39.600`)
* [CVE-2023-39113](CVE-2023/CVE-2023-391xx/CVE-2023-39113.json) (`2023-08-08T17:26:35.647`)
* [CVE-2023-39114](CVE-2023/CVE-2023-391xx/CVE-2023-39114.json) (`2023-08-08T17:38:09.920`)
* [CVE-2023-3329](CVE-2023/CVE-2023-33xx/CVE-2023-3329.json) (`2023-08-08T17:39:41.627`)
* [CVE-2023-36082](CVE-2023/CVE-2023-360xx/CVE-2023-36082.json) (`2023-08-08T17:40:37.243`)
* [CVE-2023-38746](CVE-2023/CVE-2023-387xx/CVE-2023-38746.json) (`2023-08-08T17:40:50.963`)
* [CVE-2023-3348](CVE-2023/CVE-2023-33xx/CVE-2023-3348.json) (`2023-08-08T17:40:55.623`)
* [CVE-2023-3932](CVE-2023/CVE-2023-39xx/CVE-2023-3932.json) (`2023-08-08T17:41:16.460`)
* [CVE-2023-38747](CVE-2023/CVE-2023-387xx/CVE-2023-38747.json) (`2023-08-08T17:41:41.393`)
* [CVE-2023-38748](CVE-2023/CVE-2023-387xx/CVE-2023-38748.json) (`2023-08-08T17:41:51.407`)
* [CVE-2023-4118](CVE-2023/CVE-2023-41xx/CVE-2023-4118.json) (`2023-08-08T17:42:15.643`)
* [CVE-2023-39552](CVE-2023/CVE-2023-395xx/CVE-2023-39552.json) (`2023-08-08T17:44:27.907`)
* [CVE-2023-4119](CVE-2023/CVE-2023-41xx/CVE-2023-4119.json) (`2023-08-08T17:45:34.960`)
* [CVE-2023-4120](CVE-2023/CVE-2023-41xx/CVE-2023-4120.json) (`2023-08-08T17:46:50.760`)
* [CVE-2023-4121](CVE-2023/CVE-2023-41xx/CVE-2023-4121.json) (`2023-08-08T17:47:31.630`)
* [CVE-2023-33364](CVE-2023/CVE-2023-333xx/CVE-2023-33364.json) (`2023-08-08T17:51:10.123`)
## Download and Usage