mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-10-11T14:00:25.388339+00:00
This commit is contained in:
parent
5147259a3c
commit
5063775eff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-28651",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-27T12:15:08.197",
|
||||
"lastModified": "2021-09-14T17:07:23.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T12:15:09.843",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.squid-cache.org/show_bug.cgi?id=5104",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-28652",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-27T12:15:08.230",
|
||||
"lastModified": "2022-04-19T03:57:23.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T12:15:09.960",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -142,6 +142,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.squid-cache.org/show_bug.cgi?id=5106",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-28662",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-27T12:15:08.263",
|
||||
"lastModified": "2022-04-19T03:56:27.300",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T12:15:10.060",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -137,6 +137,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.squid-cache.org/Versions/v6/changesets/squid-6-051824924c709bd6162a378f746fb859454c674e.patch",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-31806",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-27T13:15:08.270",
|
||||
"lastModified": "2021-09-14T17:37:38.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T12:15:10.147",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -156,6 +156,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-31807",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-06-08T20:15:09.057",
|
||||
"lastModified": "2021-09-14T14:31:45.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T12:15:10.237",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -252,6 +252,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-31808",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-27T14:15:07.500",
|
||||
"lastModified": "2022-07-12T17:42:04.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T12:15:10.333",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -156,6 +156,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-33620",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-28T12:15:07.697",
|
||||
"lastModified": "2022-06-03T17:30:46.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-11T12:15:10.413",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -156,6 +156,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-1e05a85bd28c22c9ca5d3ac9f5e86d6269ec0a8c.patch",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-42451",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2023-10-11T06:15:09.387",
|
||||
"lastModified": "2023-10-11T06:15:09.387",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain credentials within the BigFix Patch Management Download Plug-ins are stored insecurely and could be exposed to a local privileged user.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Ciertas credenciales dentro de los complementos de BigFix Patch Management Download se almacenan de forma no segura y podr\u00edan quedar expuestas a un usuario local privilegiado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-44757",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2023-10-11T07:15:09.237",
|
||||
"lastModified": "2023-10-11T07:15:09.237",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BigFix Insights for Vulnerability Remediation (IVR) uses weak cryptography that can lead to credential exposure. An attacker could gain access to sensitive information, modify data in unexpected ways, etc.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "BigFix Insights for Vulnerability Remediation (IVR) utiliza criptograf\u00eda d\u00e9bil que puede provocar la exposici\u00f3n de las credenciales. Un atacante podr\u00eda obtener acceso a informaci\u00f3n confidencial, modificar datos de formas inesperadas, etc."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-44758",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2023-10-11T07:15:09.477",
|
||||
"lastModified": "2023-10-11T07:15:09.477",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BigFix Insights/IVR fixlet uses improper credential handling within certain fixlet content. An attacker can gain access to information that is not explicitly authorized.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El fixlet de BigFix Insights/IVR utiliza un manejo de credenciales inadecuado dentro de determinado contenido del fixlet. Un atacante puede obtener acceso a informaci\u00f3n que no est\u00e1 expl\u00edcitamente autorizada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,19 +2,175 @@
|
||||
"id": "CVE-2023-26236",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T01:15:10.137",
|
||||
"lastModified": "2023-10-05T12:53:40.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-10-11T14:00:04.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in WatchGuard EPDR 8.0.21.0002. Due to a weak implementation of message handling between WatchGuard EPDR processes, it is possible to perform a Local Privilege Escalation on Windows by sending a crafted message to a named pipe."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en WatchGuard EPDR 8.0.21.0002. Debido a una implementaci\u00f3n d\u00e9bil del manejo de mensajes entre los procesos de WatchGuard EPDR, es posible realizar una escalada de privilegios locales en Windows enviando un mensaje manipulado a un pipe conocido."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:epp_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "2361AC95-E9B5-4494-B4D3-A516E92E0180"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:epp:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCB7410D-4F42-49A1-B65F-2F57FBED5591"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:edr_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "D0BB0A60-F997-44F6-9B83-D89525D5E90B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:edr:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE98983-49EA-4B3D-B561-509DF3244630"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:epdr_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "0E547FF3-E496-4AF4-8BA4-67D92E104335"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:epdr:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC28BE1A-C558-4132-8376-A1177030CB90"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:panda_ad360_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "6FE92F05-0078-4B53-A282-5C7B9D70F17B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:panda_ad360:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8521691C-F38A-4E4C-ADE7-717218F2E951"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2023-00004",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,175 @@
|
||||
"id": "CVE-2023-26237",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T01:15:10.187",
|
||||
"lastModified": "2023-10-05T12:53:40.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-10-11T14:00:07.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in WatchGuard EPDR 8.0.21.0002. It is possible to bypass the defensive capabilities by adding a registry key as SYSTEM."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en WatchGuard EPDR 8.0.21.0002. Es posible evitar las capacidades defensivas agregando una clave de registro como SYSTEMA."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:epp_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "2361AC95-E9B5-4494-B4D3-A516E92E0180"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:epp:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCB7410D-4F42-49A1-B65F-2F57FBED5591"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:edr_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "D0BB0A60-F997-44F6-9B83-D89525D5E90B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:edr:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE98983-49EA-4B3D-B561-509DF3244630"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:epdr_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "0E547FF3-E496-4AF4-8BA4-67D92E104335"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:epdr:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC28BE1A-C558-4132-8376-A1177030CB90"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:panda_ad360_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "6FE92F05-0078-4B53-A282-5C7B9D70F17B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:panda_ad360:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8521691C-F38A-4E4C-ADE7-717218F2E951"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2023-00005",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,175 @@
|
||||
"id": "CVE-2023-26238",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T01:15:10.233",
|
||||
"lastModified": "2023-10-05T12:53:40.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-10-11T14:00:08.897",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in WatchGuard EPDR 8.0.21.0002. It is possible to enable or disable defensive capabilities by sending a crafted message to a named pipe."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en WatchGuard EPDR 8.0.21.0002. Es posible habilitar o deshabilitar capacidades defensivas enviando un mensaje manipulado a un pipe conocido."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:epp_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "2361AC95-E9B5-4494-B4D3-A516E92E0180"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:epp:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCB7410D-4F42-49A1-B65F-2F57FBED5591"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:edr_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "D0BB0A60-F997-44F6-9B83-D89525D5E90B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:edr:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE98983-49EA-4B3D-B561-509DF3244630"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:epdr_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "0E547FF3-E496-4AF4-8BA4-67D92E104335"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:epdr:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC28BE1A-C558-4132-8376-A1177030CB90"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:panda_ad360_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "6FE92F05-0078-4B53-A282-5C7B9D70F17B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:panda_ad360:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8521691C-F38A-4E4C-ADE7-717218F2E951"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2023-00006",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,175 @@
|
||||
"id": "CVE-2023-26239",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T01:15:10.273",
|
||||
"lastModified": "2023-10-05T12:53:40.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-10-11T13:59:48.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in WatchGuard EPDR 8.0.21.0002. Due to a weak implementation of a password check, it is possible to obtain credentials to access the management console as a non-privileged user."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en WatchGuard EPDR 8.0.21.0002. Debido a una implementaci\u00f3n d\u00e9bil de la verificaci\u00f3n de contrase\u00f1a, es posible obtener credenciales para acceder a la consola de administraci\u00f3n como usuario sin privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-273"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:epp_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "2361AC95-E9B5-4494-B4D3-A516E92E0180"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:epp:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCB7410D-4F42-49A1-B65F-2F57FBED5591"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:edr_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "D0BB0A60-F997-44F6-9B83-D89525D5E90B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:edr:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE98983-49EA-4B3D-B561-509DF3244630"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:epdr_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "0E547FF3-E496-4AF4-8BA4-67D92E104335"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:epdr:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC28BE1A-C558-4132-8376-A1177030CB90"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:watchguard:panda_ad360_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.00.22.0010",
|
||||
"matchCriteriaId": "6FE92F05-0078-4B53-A282-5C7B9D70F17B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:watchguard:panda_ad360:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8521691C-F38A-4E4C-ADE7-717218F2E951"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2023-00007",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-26318",
|
||||
"sourceIdentifier": "security@xiaomi.com",
|
||||
"published": "2023-10-11T07:15:09.890",
|
||||
"lastModified": "2023-10-11T07:15:09.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Xiaomi Xiaomi Router allows Overflow Buffers."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de copia del b\u00fafer sin verificar el tama\u00f1o de la entrada ('Desbordamiento de b\u00fafer cl\u00e1sico') de Xiaomi en Xiaomi Router permite desbordar b\u00faferes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-26319",
|
||||
"sourceIdentifier": "security@xiaomi.com",
|
||||
"published": "2023-10-11T07:15:10.103",
|
||||
"lastModified": "2023-10-11T07:15:10.103",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Xiaomi Xiaomi Router allows Command Injection."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La neutralizaci\u00f3n inadecuada de los elementos especiales utilizados en una vulnerabilidad de comando (\"Inyecci\u00f3n de comando\") en Xiaomi Router permite la inyecci\u00f3n de comando."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-26320",
|
||||
"sourceIdentifier": "security@xiaomi.com",
|
||||
"published": "2023-10-11T07:15:10.257",
|
||||
"lastModified": "2023-10-11T07:15:10.257",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Xiaomi Xiaomi Router allows Command Injection."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La neutralizaci\u00f3n inadecuada de los elementos especiales utilizados en una vulnerabilidad de comando (\"Inyecci\u00f3n de comando\") en Xiaomi Router permite la inyecci\u00f3n de comando."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
55
CVE-2023/CVE-2023-263xx/CVE-2023-26370.json
Normal file
55
CVE-2023/CVE-2023-263xx/CVE-2023-26370.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-26370",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2023-10-11T12:15:10.580",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Photoshop versions 23.5.5 (and earlier) and 24.7 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-824"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/photoshop/apsb23-51.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-37536",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2023-10-11T07:15:10.580",
|
||||
"lastModified": "2023-10-11T07:15:10.580",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An integer overflow in xerces-c++ 3.2.3 in BigFix Platform allows remote attackers to cause out-of-bound access via HTTP request."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un desbordamiento de enteros de xerces-c++ 3.2.3 en BigFix Platform permite a atacantes remotos provocar acceso fuera de l\u00edmites a trav\u00e9s de una solicitud HTTP."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
43
CVE-2023/CVE-2023-375xx/CVE-2023-37538.json
Normal file
43
CVE-2023/CVE-2023-375xx/CVE-2023-37538.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-37538",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2023-10-11T13:15:09.557",
|
||||
"lastModified": "2023-10-11T13:15:09.557",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HCL Digital Experience is susceptible to cross site scripting (XSS). One subcomponent is vulnerable to reflected XSS. In reflected XSS, an attacker must induce a victim to click on a crafted URL from some delivery mechanism (email, other web site).\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108006",
|
||||
"source": "psirt@hcl.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-382xx/CVE-2023-38216.json
Normal file
55
CVE-2023/CVE-2023-382xx/CVE-2023-38216.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-38216",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2023-10-11T12:15:10.797",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Bridge versions 12.0.4 (and earlier) and 13.0.3 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/bridge/apsb23-49.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-382xx/CVE-2023-38217.json
Normal file
55
CVE-2023/CVE-2023-382xx/CVE-2023-38217.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-38217",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2023-10-11T12:15:10.907",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Bridge versions 12.0.4 (and earlier) and 13.0.3 (and earlier) are affected by an Out-of-bounds Read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/bridge/apsb23-49.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-413xx/CVE-2023-41304.json
Normal file
36
CVE-2023/CVE-2023-413xx/CVE-2023-41304.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-41304",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T12:15:10.993",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Parameter verification vulnerability in the window module.Successful exploitation of this vulnerability may cause the size of an app window to be adjusted to that of a floating window."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-42138",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-10-11T09:15:10.417",
|
||||
"lastModified": "2023-10-11T09:15:10.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-of-bounds read vulnerability exists in KV STUDIO Ver. 11.62 and earlier and KV REPLAY VIEWER Ver. 2.62 and earlier. If this vulnerability is exploited, information may be disclosed or arbitrary code may be executed by having a user of KV STUDIO PLAYER open a specially crafted file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de lectura fuera de l\u00edmites en KV STUDIO Ver. 11.62 y anteriores y KV REPLAY VIEWER Ver. 2.62 y anteriores. Si se explota esta vulnerabilidad, se puede divulgar informaci\u00f3n o se puede ejecutar c\u00f3digo arbitrario haciendo que un usuario de KV STUDIO PLAYER abra un archivo especialmente manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44093",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T11:15:13.423",
|
||||
"lastModified": "2023-10-11T11:15:13.423",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44094",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T11:15:13.577",
|
||||
"lastModified": "2023-10-11T11:15:13.577",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
36
CVE-2023/CVE-2023-440xx/CVE-2023-44095.json
Normal file
36
CVE-2023/CVE-2023-440xx/CVE-2023-44095.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-44095",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T12:15:11.070",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44096",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T11:15:13.833",
|
||||
"lastModified": "2023-10-11T11:15:13.833",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
36
CVE-2023/CVE-2023-440xx/CVE-2023-44097.json
Normal file
36
CVE-2023/CVE-2023-440xx/CVE-2023-44097.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-44097",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T12:15:11.130",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-441xx/CVE-2023-44100.json
Normal file
24
CVE-2023/CVE-2023-441xx/CVE-2023-44100.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-44100",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T12:15:11.193",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-441xx/CVE-2023-44101.json
Normal file
20
CVE-2023/CVE-2023-441xx/CVE-2023-44101.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-44101",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T12:15:11.250",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Bluetooth module has a vulnerability in permission control for broadcast notifications.Successful exploitation of this vulnerability may affect confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-441xx/CVE-2023-44102.json
Normal file
24
CVE-2023/CVE-2023-441xx/CVE-2023-44102.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-44102",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T12:15:11.313",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability can cause the Bluetooth function to be unavailable."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-441xx/CVE-2023-44103.json
Normal file
36
CVE-2023/CVE-2023-441xx/CVE-2023-44103.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-44103",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T12:15:11.357",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-of-bounds read vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-441xx/CVE-2023-44104.json
Normal file
24
CVE-2023/CVE-2023-441xx/CVE-2023-44104.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-44104",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T12:15:11.520",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-441xx/CVE-2023-44105.json
Normal file
36
CVE-2023/CVE-2023-441xx/CVE-2023-44105.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-44105",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T13:15:09.820",
|
||||
"lastModified": "2023-10-11T13:15:09.820",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of permissions not being strictly verified in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-441xx/CVE-2023-44106.json
Normal file
24
CVE-2023/CVE-2023-441xx/CVE-2023-44106.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-44106",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T12:15:11.570",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "API permission management vulnerability in the Fwk-Display module.Successful exploitation of this vulnerability may cause features to perform abnormally."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-441xx/CVE-2023-44107.json
Normal file
20
CVE-2023/CVE-2023-441xx/CVE-2023-44107.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-44107",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T13:15:09.977",
|
||||
"lastModified": "2023-10-11T13:15:09.977",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": " Vulnerability of defects introduced in the design process in the screen projection module.Successful exploitation of this vulnerability may affect service availability and integrity."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-441xx/CVE-2023-44108.json
Normal file
36
CVE-2023/CVE-2023-441xx/CVE-2023-44108.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-44108",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T13:15:10.030",
|
||||
"lastModified": "2023-10-11T13:15:10.030",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44109",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T11:15:14.120",
|
||||
"lastModified": "2023-10-11T11:15:14.120",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
36
CVE-2023/CVE-2023-441xx/CVE-2023-44110.json
Normal file
36
CVE-2023/CVE-2023-441xx/CVE-2023-44110.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-44110",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T12:15:11.623",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-of-bounds access vulnerability in the audio module.Successful exploitation of this vulnerability may affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-441xx/CVE-2023-44111.json
Normal file
24
CVE-2023/CVE-2023-441xx/CVE-2023-44111.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-44111",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T12:15:11.713",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-441xx/CVE-2023-44114.json
Normal file
36
CVE-2023/CVE-2023-441xx/CVE-2023-44114.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-44114",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T13:15:10.097",
|
||||
"lastModified": "2023-10-11T13:15:10.097",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-of-bounds array vulnerability in the dataipa module.Successful exploitation of this vulnerability may affect service confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-441xx/CVE-2023-44116.json
Normal file
36
CVE-2023/CVE-2023-441xx/CVE-2023-44116.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-44116",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T13:15:10.160",
|
||||
"lastModified": "2023-10-11T13:15:10.160",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of access permissions not being strictly verified in the APPWidget module.Successful exploitation of this vulnerability may cause some apps to run without being authorized."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-441xx/CVE-2023-44118.json
Normal file
24
CVE-2023/CVE-2023-441xx/CVE-2023-44118.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-44118",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T13:15:10.223",
|
||||
"lastModified": "2023-10-11T13:15:10.223",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of undefined permissions in the MeeTime module.Successful exploitation of this vulnerability will affect availability and confidentiality."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-441xx/CVE-2023-44119.json
Normal file
36
CVE-2023/CVE-2023-441xx/CVE-2023-44119.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-44119",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-10-11T13:15:10.277",
|
||||
"lastModified": "2023-10-11T13:15:10.277",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability of mutual exclusion management in the kernel module.Successful exploitation of this vulnerability will affect availability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
|
||||
"source": "psirt@huawei.com"
|
||||
},
|
||||
{
|
||||
"url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-44689",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-10-11T01:15:08.780",
|
||||
"lastModified": "2023-10-11T01:15:08.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "e-Gov Client Application (Windows version) versions prior to 2.1.1.0 and e-Gov Client Application (macOS version) versions prior to 1.1.1.0 are vulnerable to improper authorization in handler for custom URL scheme. A crafted URL may direct the product to access an arbitrary website. As a result, the user may become a victim of a phishing attack."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de la aplicaci\u00f3n e-Gov Client (versi\u00f3n de Windows) anteriores a 2.1.1.0 y las versiones de la aplicaci\u00f3n e-Gov Client (versi\u00f3n de macOS) anteriores a 1.1.1.0 son vulnerables a una autorizaci\u00f3n inadecuada en el controlador del esquema de URL personalizado. Una URL manipulada puede dirigir el producto a acceder a un sitio web arbitrario. Como resultado, el usuario puede convertirse en v\u00edctima de un ataque de phishing."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
32
CVE-2023/CVE-2023-449xx/CVE-2023-44981.json
Normal file
32
CVE-2023/CVE-2023-449xx/CVE-2023-44981.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-44981",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-10-11T12:15:11.760",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authentication ID is listed in zoo.cfg server list. The instance part in SASL auth ID is optional and if it's missing, like 'eve@EXAMPLE.COM', the authorization check will be skipped.\u00a0As a result an arbitrary endpoint could join the cluster and begin propagating counterfeit changes to the leader, essentially giving it complete read-write access to the data tree.\u00a0Quorum Peer authentication is not enabled by default.\n\nUsers are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, which fixes the issue.\n\nAlternately ensure the ensemble election/quorum communication is protected by a firewall as this will mitigate the issue.\n\nSee the documentation for more details on correct cluster administration.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/wf0yrk84dg1942z1o74kd8nycg6pgm5b",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-44997",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-10-11T08:15:08.883",
|
||||
"lastModified": "2023-10-11T08:15:08.883",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Nitin Rathod WP Forms Puzzle Captcha plugin <=\u00a04.1 versions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Nitin Rathod WP Forms Puzzle Captcha en versiones <= 4.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-45194",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-10-11T01:15:08.837",
|
||||
"lastModified": "2023-10-11T01:15:08.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of default credentials vulnerability in MR-GM2 firmware Ver. 3.00.03 and earlier, and MR-GM3 (-D/-K/-S/-DK/-DKS/-M/-W) firmware Ver. 1.03.45 and earlier allows a network-adjacent unauthenticated attacker to intercept wireless LAN communication, when the affected product performs the communication without changing the pre-shared key from the factory-default configuration."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad del uso de credenciales predeterminadas en la versi\u00f3n del firmware MR-GM2. 3.00.03 y anteriores, y firmware MR-GM3 (-D/-K/-S/-DK/-DKS/-M/-W) versi\u00f3n 1.03.45 y anteriores, permiten que un atacante no autenticado adyacente a la red intercepte la comunicaci\u00f3n LAN inal\u00e1mbrica, cuando el producto afectado realiza la comunicaci\u00f3n sin cambiar la clave precompartida de la configuraci\u00f3n predeterminada de f\u00e1brica."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-4990",
|
||||
"sourceIdentifier": "product-security@gg.jp.panasonic.com",
|
||||
"published": "2023-10-11T08:15:09.053",
|
||||
"lastModified": "2023-10-11T08:15:09.053",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory traversal vulnerability in MCL-Net versions prior to 4.6 Update Package (P01) may allow attackers to read arbitrary files."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de Directory Traversal en versiones de MCL-Net anteriores al paquete de actualizaci\u00f3n 4.6 (P01) puede permitir a los atacantes leer archivos arbitrarios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-5511",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-10-11T01:15:08.887",
|
||||
"lastModified": "2023-10-11T01:15:08.887",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-10-11T12:54:12.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) in GitHub repository snipe/snipe-it prior to v.6.2.3."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Cross-Site Request Forgery (CSRF) en el repositorio de GitHub snipe/snipe-it antes de v.6.2.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
59
CVE-2023/CVE-2023-55xx/CVE-2023-5520.json
Normal file
59
CVE-2023/CVE-2023-55xx/CVE-2023-5520.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-5520",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-10-11T12:15:11.857",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/commit/5692dc729491805e0e5f55c21d50ba1e6b19e88e",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/681e42d0-18d4-4ebc-aba0-c5b0f77ac74a",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-55xx/CVE-2023-5521.json
Normal file
59
CVE-2023/CVE-2023-55xx/CVE-2023-5521.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-5521",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-10-11T12:15:11.937",
|
||||
"lastModified": "2023-10-11T12:54:05.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Authorization in GitHub repository tiann/kernelsu prior to v0.6.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tiann/kernelsu/commit/a22959beae1aad96b1f72710a5daadf529c41bda",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/d438eff7-4e24-45e0-bc75-d3a5b3ab2ea1",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
80
README.md
80
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-10-11T12:00:25.741739+00:00
|
||||
2023-10-11T14:00:25.388339+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-10-11T11:15:14.120000+00:00
|
||||
2023-10-11T14:00:08.897000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,39 +29,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
227537
|
||||
227562
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `25`
|
||||
|
||||
* [CVE-2023-44093](CVE-2023/CVE-2023-440xx/CVE-2023-44093.json) (`2023-10-11T11:15:13.423`)
|
||||
* [CVE-2023-44094](CVE-2023/CVE-2023-440xx/CVE-2023-44094.json) (`2023-10-11T11:15:13.577`)
|
||||
* [CVE-2023-44096](CVE-2023/CVE-2023-440xx/CVE-2023-44096.json) (`2023-10-11T11:15:13.833`)
|
||||
* [CVE-2023-44109](CVE-2023/CVE-2023-441xx/CVE-2023-44109.json) (`2023-10-11T11:15:14.120`)
|
||||
* [CVE-2023-26370](CVE-2023/CVE-2023-263xx/CVE-2023-26370.json) (`2023-10-11T12:15:10.580`)
|
||||
* [CVE-2023-38216](CVE-2023/CVE-2023-382xx/CVE-2023-38216.json) (`2023-10-11T12:15:10.797`)
|
||||
* [CVE-2023-38217](CVE-2023/CVE-2023-382xx/CVE-2023-38217.json) (`2023-10-11T12:15:10.907`)
|
||||
* [CVE-2023-41304](CVE-2023/CVE-2023-413xx/CVE-2023-41304.json) (`2023-10-11T12:15:10.993`)
|
||||
* [CVE-2023-44095](CVE-2023/CVE-2023-440xx/CVE-2023-44095.json) (`2023-10-11T12:15:11.070`)
|
||||
* [CVE-2023-44097](CVE-2023/CVE-2023-440xx/CVE-2023-44097.json) (`2023-10-11T12:15:11.130`)
|
||||
* [CVE-2023-44100](CVE-2023/CVE-2023-441xx/CVE-2023-44100.json) (`2023-10-11T12:15:11.193`)
|
||||
* [CVE-2023-44101](CVE-2023/CVE-2023-441xx/CVE-2023-44101.json) (`2023-10-11T12:15:11.250`)
|
||||
* [CVE-2023-44102](CVE-2023/CVE-2023-441xx/CVE-2023-44102.json) (`2023-10-11T12:15:11.313`)
|
||||
* [CVE-2023-44103](CVE-2023/CVE-2023-441xx/CVE-2023-44103.json) (`2023-10-11T12:15:11.357`)
|
||||
* [CVE-2023-44104](CVE-2023/CVE-2023-441xx/CVE-2023-44104.json) (`2023-10-11T12:15:11.520`)
|
||||
* [CVE-2023-44106](CVE-2023/CVE-2023-441xx/CVE-2023-44106.json) (`2023-10-11T12:15:11.570`)
|
||||
* [CVE-2023-44110](CVE-2023/CVE-2023-441xx/CVE-2023-44110.json) (`2023-10-11T12:15:11.623`)
|
||||
* [CVE-2023-44111](CVE-2023/CVE-2023-441xx/CVE-2023-44111.json) (`2023-10-11T12:15:11.713`)
|
||||
* [CVE-2023-44981](CVE-2023/CVE-2023-449xx/CVE-2023-44981.json) (`2023-10-11T12:15:11.760`)
|
||||
* [CVE-2023-5520](CVE-2023/CVE-2023-55xx/CVE-2023-5520.json) (`2023-10-11T12:15:11.857`)
|
||||
* [CVE-2023-5521](CVE-2023/CVE-2023-55xx/CVE-2023-5521.json) (`2023-10-11T12:15:11.937`)
|
||||
* [CVE-2023-37538](CVE-2023/CVE-2023-375xx/CVE-2023-37538.json) (`2023-10-11T13:15:09.557`)
|
||||
* [CVE-2023-44105](CVE-2023/CVE-2023-441xx/CVE-2023-44105.json) (`2023-10-11T13:15:09.820`)
|
||||
* [CVE-2023-44107](CVE-2023/CVE-2023-441xx/CVE-2023-44107.json) (`2023-10-11T13:15:09.977`)
|
||||
* [CVE-2023-44108](CVE-2023/CVE-2023-441xx/CVE-2023-44108.json) (`2023-10-11T13:15:10.030`)
|
||||
* [CVE-2023-44114](CVE-2023/CVE-2023-441xx/CVE-2023-44114.json) (`2023-10-11T13:15:10.097`)
|
||||
* [CVE-2023-44116](CVE-2023/CVE-2023-441xx/CVE-2023-44116.json) (`2023-10-11T13:15:10.160`)
|
||||
* [CVE-2023-44118](CVE-2023/CVE-2023-441xx/CVE-2023-44118.json) (`2023-10-11T13:15:10.223`)
|
||||
* [CVE-2023-44119](CVE-2023/CVE-2023-441xx/CVE-2023-44119.json) (`2023-10-11T13:15:10.277`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `16`
|
||||
Recently modified CVEs: `28`
|
||||
|
||||
* [CVE-2022-43551](CVE-2022/CVE-2022-435xx/CVE-2022-43551.json) (`2023-10-11T11:15:09.723`)
|
||||
* [CVE-2022-43552](CVE-2022/CVE-2022-435xx/CVE-2022-43552.json) (`2023-10-11T11:15:10.070`)
|
||||
* [CVE-2023-23914](CVE-2023/CVE-2023-239xx/CVE-2023-23914.json) (`2023-10-11T11:15:10.340`)
|
||||
* [CVE-2023-23915](CVE-2023/CVE-2023-239xx/CVE-2023-23915.json) (`2023-10-11T11:15:10.793`)
|
||||
* [CVE-2023-23916](CVE-2023/CVE-2023-239xx/CVE-2023-23916.json) (`2023-10-11T11:15:10.960`)
|
||||
* [CVE-2023-27533](CVE-2023/CVE-2023-275xx/CVE-2023-27533.json) (`2023-10-11T11:15:11.197`)
|
||||
* [CVE-2023-27534](CVE-2023/CVE-2023-275xx/CVE-2023-27534.json) (`2023-10-11T11:15:11.447`)
|
||||
* [CVE-2023-27535](CVE-2023/CVE-2023-275xx/CVE-2023-27535.json) (`2023-10-11T11:15:11.530`)
|
||||
* [CVE-2023-27536](CVE-2023/CVE-2023-275xx/CVE-2023-27536.json) (`2023-10-11T11:15:11.643`)
|
||||
* [CVE-2023-27537](CVE-2023/CVE-2023-275xx/CVE-2023-27537.json) (`2023-10-11T11:15:11.753`)
|
||||
* [CVE-2023-27538](CVE-2023/CVE-2023-275xx/CVE-2023-27538.json) (`2023-10-11T11:15:11.977`)
|
||||
* [CVE-2023-28319](CVE-2023/CVE-2023-283xx/CVE-2023-28319.json) (`2023-10-11T11:15:12.140`)
|
||||
* [CVE-2023-28320](CVE-2023/CVE-2023-283xx/CVE-2023-28320.json) (`2023-10-11T11:15:12.517`)
|
||||
* [CVE-2023-28321](CVE-2023/CVE-2023-283xx/CVE-2023-28321.json) (`2023-10-11T11:15:12.713`)
|
||||
* [CVE-2023-28322](CVE-2023/CVE-2023-283xx/CVE-2023-28322.json) (`2023-10-11T11:15:12.940`)
|
||||
* [CVE-2023-38039](CVE-2023/CVE-2023-380xx/CVE-2023-38039.json) (`2023-10-11T11:15:13.127`)
|
||||
* [CVE-2021-31806](CVE-2021/CVE-2021-318xx/CVE-2021-31806.json) (`2023-10-11T12:15:10.147`)
|
||||
* [CVE-2021-31807](CVE-2021/CVE-2021-318xx/CVE-2021-31807.json) (`2023-10-11T12:15:10.237`)
|
||||
* [CVE-2021-31808](CVE-2021/CVE-2021-318xx/CVE-2021-31808.json) (`2023-10-11T12:15:10.333`)
|
||||
* [CVE-2021-33620](CVE-2021/CVE-2021-336xx/CVE-2021-33620.json) (`2023-10-11T12:15:10.413`)
|
||||
* [CVE-2022-42451](CVE-2022/CVE-2022-424xx/CVE-2022-42451.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2022-44757](CVE-2022/CVE-2022-447xx/CVE-2022-44757.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2022-44758](CVE-2022/CVE-2022-447xx/CVE-2022-44758.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2023-44094](CVE-2023/CVE-2023-440xx/CVE-2023-44094.json) (`2023-10-11T12:54:05.787`)
|
||||
* [CVE-2023-44096](CVE-2023/CVE-2023-440xx/CVE-2023-44096.json) (`2023-10-11T12:54:05.787`)
|
||||
* [CVE-2023-44109](CVE-2023/CVE-2023-441xx/CVE-2023-44109.json) (`2023-10-11T12:54:05.787`)
|
||||
* [CVE-2023-44689](CVE-2023/CVE-2023-446xx/CVE-2023-44689.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2023-45194](CVE-2023/CVE-2023-451xx/CVE-2023-45194.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2023-5511](CVE-2023/CVE-2023-55xx/CVE-2023-5511.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2023-26318](CVE-2023/CVE-2023-263xx/CVE-2023-26318.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2023-26319](CVE-2023/CVE-2023-263xx/CVE-2023-26319.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2023-26320](CVE-2023/CVE-2023-263xx/CVE-2023-26320.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2023-37536](CVE-2023/CVE-2023-375xx/CVE-2023-37536.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2023-44997](CVE-2023/CVE-2023-449xx/CVE-2023-44997.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2023-4990](CVE-2023/CVE-2023-49xx/CVE-2023-4990.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2023-42138](CVE-2023/CVE-2023-421xx/CVE-2023-42138.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2023-44093](CVE-2023/CVE-2023-440xx/CVE-2023-44093.json) (`2023-10-11T12:54:12.883`)
|
||||
* [CVE-2023-26239](CVE-2023/CVE-2023-262xx/CVE-2023-26239.json) (`2023-10-11T13:59:48.340`)
|
||||
* [CVE-2023-26236](CVE-2023/CVE-2023-262xx/CVE-2023-26236.json) (`2023-10-11T14:00:04.993`)
|
||||
* [CVE-2023-26237](CVE-2023/CVE-2023-262xx/CVE-2023-26237.json) (`2023-10-11T14:00:07.037`)
|
||||
* [CVE-2023-26238](CVE-2023/CVE-2023-262xx/CVE-2023-26238.json) (`2023-10-11T14:00:08.897`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user