Auto-Update: 2023-11-02T03:00:19.901522+00:00

This commit is contained in:
cad-safe-bot 2023-11-02 03:00:24 +00:00
parent 04c1434c9f
commit 5075330c37
50 changed files with 1834 additions and 241 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24370",
"sourceIdentifier": "contact@wpscan.com",
"published": "2021-06-21T20:15:08.727",
"lastModified": "2023-10-18T01:15:25.467",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:50:56.673",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -132,7 +132,11 @@
},
{
"url": "https://www.secpod.com/blog/critical-zero-day-flaw-actively-exploited-in-wordpress-fancy-product-designer-plugin/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/blog/2021/06/critical-0-day-in-fancy-product-designer-under-active-attack/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1388",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2022-05-05T17:15:10.570",
"lastModified": "2023-10-18T01:15:25.983",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:54:15.380",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2022-05-10",
"cisaActionDue": "2022-05-31",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -621,7 +621,12 @@
},
{
"url": "https://www.secpod.com/blog/critical-f5-big-ip-remote-code-execution-vulnerability-patch-now/",
"source": "f5sirt@f5.com"
"source": "f5sirt@f5.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-2541",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:14.377",
"lastModified": "2023-10-20T16:15:18.660",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:20:53.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -103,8 +103,7 @@
"url": "https://plugins.trac.wordpress.org/browser/ucontext-for-amazon/trunk/app/Ucontext4a_Ajax.php",
"source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
"Patch"
]
},
{
@ -117,7 +116,10 @@
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f7c43d4-cf21-4324-bc77-50bdc2c24661?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2541",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-27811",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-24T03:15:06.827",
"lastModified": "2022-03-30T14:47:02.383",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-02T01:15:08.503",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -94,6 +94,14 @@
}
],
"references": [
{
"url": "https://gitlab.gnome.org/GNOME/ocrfeeder/-/commit/5286120c8bc8b7ba74e0f9b19b5262b509f38cee",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.gnome.org/GNOME/ocrfeeder/-/issues/20",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.gnome.org/GNOME/ocrfeeder/-/merge_requests/13",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-2941",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:15.200",
"lastModified": "2023-10-20T16:15:18.873",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:15:45.410",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,8 +90,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-useronline_project:wp-useronline:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.88.0",
"matchCriteriaId": "18214189-9B13-4D53-ACE3-8213B73CF4F2"
"versionEndExcluding": "2.88.1",
"matchCriteriaId": "12DF2FAF-618A-4089-A722-A4E3C966451D"
}
]
}
@ -103,25 +103,31 @@
"url": "https://github.com/lesterchan/wp-useronline/commit/59c76b20e4e27489f93dee4ef1254d6204e08b3c",
"source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
"Patch"
]
},
{
"url": "https://packetstormsecurity.com/files/168479/wpuseronline2880-xss.txt",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2770235%40wp-useronline&new=2770235%40wp-useronline&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5c4fb14c-de6d-4247-8f83-050f1350f6a2?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2941",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-2943",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:15.267",
"lastModified": "2023-10-26T21:15:07.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:16:16.470",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,8 +90,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:connekthq:ajax_load_more:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "5.5.3",
"matchCriteriaId": "F53D9CB5-1960-4C57-903D-9AA1027862D8"
"versionEndExcluding": "5.5.4",
"matchCriteriaId": "506CF2A6-A4C6-4243-A655-96694C37296D"
}
]
}
@ -111,13 +111,15 @@
"url": "https://plugins.svn.wordpress.org/ajax-load-more/tags/5.5.4/README.txt",
"source": "security@wordfence.com",
"tags": [
"Release Notes",
"Third Party Advisory"
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d643d07-7533-430b-a1d8-8e66a2a2c5e6?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2943",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-30011",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-16T13:15:07.873",
"lastModified": "2022-05-24T19:49:32.207",
"lastModified": "2023-11-02T01:12:30.027",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hospital_managment_system_project:hospital_managment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A632F7B8-A06D-4D39-8B8F-E91CAAAEA006"
"criteria": "cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "36653204-5E38-44E3-B8FD-580F2D27E958"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41727",
"sourceIdentifier": "security@golang.org",
"published": "2023-02-28T18:15:10.200",
"lastModified": "2023-10-16T03:15:08.950",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T01:24:55.377",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -77,6 +77,26 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
}
],
"references": [
@ -104,11 +124,19 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1572",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1400",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-03-27T16:15:09.960",
"lastModified": "2023-10-16T09:15:10.080",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T01:22:36.153",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -56,8 +56,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "5.16.2",
"matchCriteriaId": "0AA7F72B-4997-4F0D-AC8D-CACE4B5F9F8B"
"versionEndExcluding": "6.5.2",
"matchCriteriaId": "5B689965-73E3-45EA-86BA-89AC058C9A30"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20588",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-08-08T18:15:11.653",
"lastModified": "2023-10-20T00:15:11.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:16:05.347",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -57,6 +57,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -907,104 +912,236 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA1950D-1D9F-4401-AA86-CF3028EFD286"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/25/3",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/25/4",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/25/5",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/25/7",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/25/8",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/26/5",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/26/8",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/26/9",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/27/1",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/12",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/13",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/14",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/15",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/16",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/9",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/04/1",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/04/2",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/04/3",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/04/4",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://xenbits.xen.org/xsa/advisory-439.html",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/",
"source": "psirt@amd.com"
"source": "psirt@amd.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21255",
"sourceIdentifier": "security@android.com",
"published": "2023-07-13T00:15:24.053",
"lastModified": "2023-10-20T00:15:12.217",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:13:59.657",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -65,6 +65,26 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
}
]
}
]
}
],
"references": [
@ -77,7 +97,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-07-01",
@ -89,7 +113,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21739",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-01-10T22:15:17.727",
"lastModified": "2023-10-19T18:30:09.020",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:08:12.617",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -241,7 +241,11 @@
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21739",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24516",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-08-22T19:16:34.557",
"lastModified": "2023-10-16T10:15:10.647",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T01:21:22.490",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -97,7 +97,11 @@
"references": [
{
"url": "https://gist.github.com/Argonx21/5ef4d123c975285b3a42835c8e81603a",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24517",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-08-22T19:16:34.693",
"lastModified": "2023-10-16T10:15:10.890",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T01:20:14.390",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,19 +17,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
@ -97,7 +97,10 @@
"references": [
{
"url": "https://gist.github.com/Argonx21/9ab62f6e5d8bc6d39b8a338426af121e",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Exploit"
]
},
{
"url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26116",
"sourceIdentifier": "report@snyk.io",
"published": "2023-03-30T05:15:07.410",
"lastModified": "2023-10-18T04:15:10.527",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:45:31.490",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -83,12 +83,31 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26117",
"sourceIdentifier": "report@snyk.io",
"published": "2023-03-30T05:15:07.687",
"lastModified": "2023-10-18T04:15:10.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:46:39.933",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -83,12 +83,31 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26118",
"sourceIdentifier": "report@snyk.io",
"published": "2023-03-30T05:15:07.750",
"lastModified": "2023-10-18T04:15:10.720",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:52:14.703",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -83,12 +83,31 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2668",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T07:15:08.733",
"lastModified": "2023-10-23T06:15:12.467",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:23:39.293",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -83,7 +83,7 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
@ -113,7 +123,11 @@
"references": [
{
"url": "https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2668.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.228884",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2669",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T08:15:09.063",
"lastModified": "2023-10-23T07:15:10.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:24:44.273",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -123,7 +123,11 @@
"references": [
{
"url": "https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2669.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.228885",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2670",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T08:15:09.130",
"lastModified": "2023-10-23T07:15:10.450",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:27:21.597",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,19 +17,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
@ -83,8 +83,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -113,7 +123,11 @@
"references": [
{
"url": "https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2670.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.228886",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2671",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T09:15:10.447",
"lastModified": "2023-10-23T07:15:10.543",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:27:59.993",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -83,7 +83,7 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
@ -113,7 +123,11 @@
"references": [
{
"url": "https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2671.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.228887",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2672",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T09:15:10.520",
"lastModified": "2023-10-23T07:15:10.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:28:30.077",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -83,7 +83,7 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
@ -113,7 +123,11 @@
"references": [
{
"url": "https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2672.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.228888",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27320",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-28T18:15:10.547",
"lastModified": "2023-09-29T14:15:09.913",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T01:55:45.313",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -135,11 +135,17 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-12",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230413-0009/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/02/28/1",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28486",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-16T01:15:47.003",
"lastModified": "2023-09-29T14:15:10.033",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T01:59:06.177",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -62,6 +62,21 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
}
]
}
]
}
],
"references": [
@ -81,11 +96,17 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-12",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0002/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28487",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-16T01:15:47.067",
"lastModified": "2023-09-29T14:15:10.113",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T01:58:22.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -62,6 +62,21 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
}
]
}
]
}
],
"references": [
@ -81,11 +96,17 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-12",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0002/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2886",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-05-25T09:15:12.303",
"lastModified": "2023-10-18T08:15:07.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:46:01.450",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29407",
"sourceIdentifier": "security@golang.org",
"published": "2023-08-02T20:15:11.760",
"lastModified": "2023-10-16T03:15:09.063",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T01:24:01.513",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -72,6 +72,26 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
}
],
"references": [
@ -92,11 +112,19 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1990",
@ -109,7 +137,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230831-0009/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29408",
"sourceIdentifier": "security@golang.org",
"published": "2023-08-02T20:15:11.857",
"lastModified": "2023-10-16T03:15:09.157",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T01:23:05.530",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -72,6 +72,26 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
}
],
"references": [
@ -93,11 +113,19 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1989",
@ -110,7 +138,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230831-0009/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2978",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-30T14:15:09.763",
"lastModified": "2023-10-23T08:15:08.147",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:30:50.020",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,20 +17,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
@ -83,7 +83,7 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -91,6 +91,16 @@
"value": "CWE-639"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
@ -113,7 +123,11 @@
"references": [
{
"url": "https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://pydio.com/en/community/releases/pydio-cells/pydio-cells-enterprise-421",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2979",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-30T14:15:09.843",
"lastModified": "2023-10-23T08:15:08.253",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:31:33.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,19 +17,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
@ -83,8 +83,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -113,7 +123,11 @@
"references": [
{
"url": "https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://pydio.com/en/community/releases/pydio-cells/pydio-cells-enterprise-421",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31084",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-24T06:15:07.997",
"lastModified": "2023-10-20T00:15:13.787",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:41:00.627",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -61,24 +61,110 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw@mail.gmail.com/",
@ -91,15 +177,24 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230929-0003/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5448",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31425",
"sourceIdentifier": "sirt@brocade.com",
"published": "2023-08-01T21:15:10.597",
"lastModified": "2023-09-08T17:15:15.900",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T02:01:21.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -86,7 +86,10 @@
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"source": "sirt@brocade.com"
"source": "sirt@brocade.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/22407",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31429",
"sourceIdentifier": "sirt@brocade.com",
"published": "2023-08-01T21:15:10.670",
"lastModified": "2023-09-08T17:15:23.453",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T02:04:35.233",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -97,7 +97,10 @@
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0007/",
"source": "sirt@brocade.com"
"source": "sirt@brocade.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22408",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3375",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-09-05T17:15:09.497",
"lastModified": "2023-10-18T08:15:07.840",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:45:00.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -60,7 +60,7 @@
},
"weaknesses": [
{
"source": "cve@usom.gov.tr",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -68,6 +68,16 @@
"value": "CWE-434"
}
]
},
{
"source": "cve@usom.gov.tr",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35788",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-16T21:15:09.340",
"lastModified": "2023-10-20T00:15:14.027",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:36:35.497",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -216,12 +216,71 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/06/17/1",
@ -248,11 +307,19 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230714-0002/",
@ -270,7 +337,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/06/07/1",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36417",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-10-10T18:15:12.190",
"lastModified": "2023-10-13T21:15:51.493",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T02:08:56.640",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,7 +11,7 @@
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en Microsoft SQL ODBC Driver"
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft SQL OLE DB"
}
],
"metrics": {
@ -59,10 +59,17 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "18.0.2",
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.0.0",
"versionEndExcluding": "18.6.0007.0",
"matchCriteriaId": "A0867B7A-05C8-40C7-B136-D05042AEE5F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.0.0",
"versionEndExcluding": "19.3.0002.0",
"matchCriteriaId": "62D6C409-E6E3-402B-B493-EBDC6A3D30A0"
"matchCriteriaId": "16A5EBE4-0A7A-4D69-A01F-0A7BB84A454E"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39318",
"sourceIdentifier": "security@golang.org",
"published": "2023-09-08T17:15:27.823",
"lastModified": "2023-10-20T15:15:11.337",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:20:00.253",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -117,7 +117,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0009/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39319",
"sourceIdentifier": "security@golang.org",
"published": "2023-09-08T17:15:27.910",
"lastModified": "2023-10-20T15:15:11.417",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:22:24.273",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -116,7 +116,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0009/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4147",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-07T14:15:11.633",
"lastModified": "2023-10-20T15:15:12.430",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:17:21.850",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -127,6 +127,51 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8173AF8-110D-4503-AA50-1BA4F79622E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6D583DDD-E84D-4180-A339-5467540DB9EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
@ -136,15 +181,24 @@
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:5069",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5091",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5093",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4147",
@ -173,19 +227,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0006/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5492",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.spinics.net/lists/stable/msg671573.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42755",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-05T19:15:11.497",
"lastModified": "2023-10-20T00:15:16.260",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T02:11:48.440",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -101,6 +101,21 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
@ -122,7 +137,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://seclists.org/oss-sec/2023/q3/229",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4273",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-09T15:15:09.823",
"lastModified": "2023-10-27T15:15:15.083",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:43:30.663",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -109,6 +109,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
@ -132,6 +137,134 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
}
]
}
]
}
],
"references": [
@ -153,15 +286,26 @@
},
{
"url": "https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/",
@ -173,15 +317,24 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231027-0002/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5492",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-43746",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-10-10T13:15:21.783",
"lastModified": "2023-10-16T19:53:30.110",
"lastModified": "2023-11-02T01:38:07.017",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -205,6 +205,409 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "86BE84EA-63BC-49A2-8004-830255114059"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "F7280AA3-6EB0-4D9B-895B-B6883071740E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "95617B72-E7D8-44D2-AFF2-976595A72AFA"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "7480CF69-7BEC-4582-85BB-58A6CBC51171"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "16795277-E8E2-4713-BD65-207655546649"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "0835E39B-F21E-4231-A4B9-5D511FF1B87A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "6EDE9EC9-8079-434F-8510-3DB4E3051BCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "F005EFFD-3A40-4762-B0D6-8760C406130F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "8705476E-A246-4B57-A0E1-FD626C1B0DE5"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "4C3AA014-6241-4EBA-BF9F-65D3D869C6E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "18CD2C82-0080-495E-8A11-957E0C182A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "3C508A36-C041-406C-9C8A-A396C6EDC750"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "D263C0C1-55C6-4AC3-B738-9F099C583AA0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "E912382D-131E-40F2-A337-72D6F2A3AD23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "91ED3C5E-92E8-44CF-AA99-A38C60AE677E"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "F16999CA-0EE1-4F56-AF60-8F002B5F7CCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "47962DDC-899F-4A98-ABF7-CC8A1AE7FF1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "46A7F81E-84A2-4304-B18F-53E5CDBCEA43"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "3FB67297-BDD9-4D15-9247-0F1A589D7450"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "E4958167-AB1F-4458-A06B-1B2DA313EEBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "D982C3E6-43DE-4AA8-889F-044E70C7FCB2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "2A96D578-675E-4B63-851F-CB71A92B25B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "944B8F9C-E5C6-4DA8-BF2B-1C0B6A388BC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "7DB6C626-BA78-4C06-8582-BFFCDF957429"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "2765BBF9-8450-4889-9961-2C6DE64656F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "DCFAFFAC-000C-414D-83CF-B8B2C529D9CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "E68BFC75-6977-4644-A169-48263B896849"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "EDD85839-D8F4-4651-ABAC-9F092955785B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "1871634A-7609-4D01-8469-3D86F36DC19D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "603324D6-FE7A-4209-B92B-94EF09AB5FF2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "D0D0A53D-5911-4406-8264-FC85ADDDD007"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "220FD008-8919-48D4-84CF-8C4D99C3C474"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "1935A1CF-50B2-4572-AA06-3504DB25B954"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "57114710-113A-4F2E-A5C2-07AB7BBC7354"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "077EBF51-B843-48B7-B31C-4BE1C99CE6F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "5EAC82FA-41CC-425A-89A0-CC9E2BF678EE"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndIncluding": "14.1.5",
"matchCriteriaId": "8A0A03A5-3120-4D8D-A580-E7546A740D61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.1.0",
"versionEndExcluding": "15.1.9",
"matchCriteriaId": "338010BF-EFC6-42B9-9F12-865C48D421EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.1.0",
"versionEndExcluding": "16.1.4",
"matchCriteriaId": "14776B4F-DDEC-4B22-82A5-EA231B3895F0"
}
]
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43788",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-10T13:15:22.137",
"lastModified": "2023-10-15T04:15:12.387",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T01:28:55.773",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -141,7 +141,11 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6FARGWN7VWXXWPXYNEEDJLRR3EWFZ3T/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-45111",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-11-02T02:15:08.357",
"lastModified": "2023-11-02T02:15:08.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities.\u00a0The 'email' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/pires",
"source": "help@fluidattacks.com"
},
{
"url": "https://projectworlds.in/",
"source": "help@fluidattacks.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-45112",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-11-02T02:15:08.447",
"lastModified": "2023-11-02T02:15:08.447",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'feedback' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/pires",
"source": "help@fluidattacks.com"
},
{
"url": "https://projectworlds.in/",
"source": "help@fluidattacks.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-45113",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-11-02T02:15:08.533",
"lastModified": "2023-11-02T02:15:08.533",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'name' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/pires",
"source": "help@fluidattacks.com"
},
{
"url": "https://projectworlds.in/",
"source": "help@fluidattacks.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-45114",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-11-02T02:15:08.623",
"lastModified": "2023-11-02T02:15:08.623",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'subject' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/pires",
"source": "help@fluidattacks.com"
},
{
"url": "https://projectworlds.in/",
"source": "help@fluidattacks.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45282",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-06T19:15:12.950",
"lastModified": "2023-10-15T19:15:09.583",
"vulnStatus": "Modified",
"lastModified": "2023-11-02T01:23:35.490",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,7 +11,7 @@
},
{
"lang": "es",
"value": "En NASA Open MCT (tambi\u00e9n conocido como openmct) 2.2.5 anterior a 545a177, la contaminaci\u00f3n del prototipo puede ocurrir mediante una acci\u00f3n de importaci\u00f3n."
"value": "En NASA Open MCT (tambi\u00e9n conocido como openmct) anterior a 3.1.0, la contaminaci\u00f3n del prototipo puede ocurrir mediante una acci\u00f3n de importaci\u00f3n."
}
],
"metrics": {
@ -59,8 +59,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nasa:openmct:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "110C12F8-84AF-42E1-9D25-B34D4EECB67F"
"criteria": "cpe:2.3:a:nasa:openmct:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.1.0",
"matchCriteriaId": "8956482C-FDAA-44A3-A397-5F57E1FA6BDB"
}
]
}
@ -70,7 +71,10 @@
"references": [
{
"url": "https://github.com/nasa/openmct/compare/v3.0.2...v3.1.0",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/nasa/openmct/pull/7094/commits/545a1770c523ecc3410dca884c6809d5ff0f9d52",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5214",
"sourceIdentifier": "security@puppet.com",
"published": "2023-10-06T18:15:12.453",
"lastModified": "2023-10-17T17:15:09.810",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-02T01:51:30.593",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -101,7 +101,10 @@
"references": [
{
"url": "https://www.puppet.com/security/cve/cve-2023-5214-privilege-escalation-puppet-bolt",
"source": "security@puppet.com"
"source": "security@puppet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-02T00:55:18.589321+00:00
2023-11-02T03:00:19.901522+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-02T00:15:23.373000+00:00
2023-11-02T02:31:33.633000+00:00
```
### Last Data Feed Release
@ -29,23 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
229560
229564
```
### CVEs added in the last Commit
Recently added CVEs: `4`
* [CVE-2023-44954](CVE-2023/CVE-2023-449xx/CVE-2023-44954.json) (`2023-11-01T23:15:07.900`)
* [CVE-2023-45202](CVE-2023/CVE-2023-452xx/CVE-2023-45202.json) (`2023-11-01T23:15:07.950`)
* [CVE-2023-45203](CVE-2023/CVE-2023-452xx/CVE-2023-45203.json) (`2023-11-01T23:15:08.047`)
* [CVE-2023-5910](CVE-2023/CVE-2023-59xx/CVE-2023-5910.json) (`2023-11-02T00:15:23.373`)
* [CVE-2023-45111](CVE-2023/CVE-2023-451xx/CVE-2023-45111.json) (`2023-11-02T02:15:08.357`)
* [CVE-2023-45112](CVE-2023/CVE-2023-451xx/CVE-2023-45112.json) (`2023-11-02T02:15:08.447`)
* [CVE-2023-45113](CVE-2023/CVE-2023-451xx/CVE-2023-45113.json) (`2023-11-02T02:15:08.533`)
* [CVE-2023-45114](CVE-2023/CVE-2023-451xx/CVE-2023-45114.json) (`2023-11-02T02:15:08.623`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `45`
* [CVE-2023-4273](CVE-2023/CVE-2023-42xx/CVE-2023-4273.json) (`2023-11-02T01:43:30.663`)
* [CVE-2023-3375](CVE-2023/CVE-2023-33xx/CVE-2023-3375.json) (`2023-11-02T01:45:00.120`)
* [CVE-2023-26116](CVE-2023/CVE-2023-261xx/CVE-2023-26116.json) (`2023-11-02T01:45:31.490`)
* [CVE-2023-2886](CVE-2023/CVE-2023-28xx/CVE-2023-2886.json) (`2023-11-02T01:46:01.450`)
* [CVE-2023-26117](CVE-2023/CVE-2023-261xx/CVE-2023-26117.json) (`2023-11-02T01:46:39.933`)
* [CVE-2023-5214](CVE-2023/CVE-2023-52xx/CVE-2023-5214.json) (`2023-11-02T01:51:30.593`)
* [CVE-2023-26118](CVE-2023/CVE-2023-261xx/CVE-2023-26118.json) (`2023-11-02T01:52:14.703`)
* [CVE-2023-27320](CVE-2023/CVE-2023-273xx/CVE-2023-27320.json) (`2023-11-02T01:55:45.313`)
* [CVE-2023-28487](CVE-2023/CVE-2023-284xx/CVE-2023-28487.json) (`2023-11-02T01:58:22.777`)
* [CVE-2023-28486](CVE-2023/CVE-2023-284xx/CVE-2023-28486.json) (`2023-11-02T01:59:06.177`)
* [CVE-2023-31425](CVE-2023/CVE-2023-314xx/CVE-2023-31425.json) (`2023-11-02T02:01:21.290`)
* [CVE-2023-31429](CVE-2023/CVE-2023-314xx/CVE-2023-31429.json) (`2023-11-02T02:04:35.233`)
* [CVE-2023-21739](CVE-2023/CVE-2023-217xx/CVE-2023-21739.json) (`2023-11-02T02:08:12.617`)
* [CVE-2023-36417](CVE-2023/CVE-2023-364xx/CVE-2023-36417.json) (`2023-11-02T02:08:56.640`)
* [CVE-2023-42755](CVE-2023/CVE-2023-427xx/CVE-2023-42755.json) (`2023-11-02T02:11:48.440`)
* [CVE-2023-4147](CVE-2023/CVE-2023-41xx/CVE-2023-4147.json) (`2023-11-02T02:17:21.850`)
* [CVE-2023-39318](CVE-2023/CVE-2023-393xx/CVE-2023-39318.json) (`2023-11-02T02:20:00.253`)
* [CVE-2023-39319](CVE-2023/CVE-2023-393xx/CVE-2023-39319.json) (`2023-11-02T02:22:24.273`)
* [CVE-2023-2668](CVE-2023/CVE-2023-26xx/CVE-2023-2668.json) (`2023-11-02T02:23:39.293`)
* [CVE-2023-2669](CVE-2023/CVE-2023-26xx/CVE-2023-2669.json) (`2023-11-02T02:24:44.273`)
* [CVE-2023-2670](CVE-2023/CVE-2023-26xx/CVE-2023-2670.json) (`2023-11-02T02:27:21.597`)
* [CVE-2023-2671](CVE-2023/CVE-2023-26xx/CVE-2023-2671.json) (`2023-11-02T02:27:59.993`)
* [CVE-2023-2672](CVE-2023/CVE-2023-26xx/CVE-2023-2672.json) (`2023-11-02T02:28:30.077`)
* [CVE-2023-2978](CVE-2023/CVE-2023-29xx/CVE-2023-2978.json) (`2023-11-02T02:30:50.020`)
* [CVE-2023-2979](CVE-2023/CVE-2023-29xx/CVE-2023-2979.json) (`2023-11-02T02:31:33.633`)
## Download and Usage