mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-11-08T23:00:19.943975+00:00
This commit is contained in:
parent
df7c0e9d63
commit
62586f066d
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-14424",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-09-13T17:29:00.633",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-11-08T21:15:27.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,9 +85,14 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-850l_firmware:*:beta1:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "269739B0-7349-4225-81D8-28CA494E4957"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "1A2C72E9-93AA-4670-B0B5-4016E442DFDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:fw114wwb07_h2ab:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E063822-8CED-46B3-BE66-7AD18F02FAC8"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +102,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -125,8 +130,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-14425",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-09-13T17:29:00.680",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-11-08T21:15:57.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,9 +85,14 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-850l_firmware:*:beta1:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "269739B0-7349-4225-81D8-28CA494E4957"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "1A2C72E9-93AA-4670-B0B5-4016E442DFDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:fw114wwb07_h2ab:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E063822-8CED-46B3-BE66-7AD18F02FAC8"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +102,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -125,8 +130,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-14426",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-09-13T17:29:00.760",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-11-08T21:16:14.590",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,9 +85,14 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-850l_firmware:*:beta1:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "269739B0-7349-4225-81D8-28CA494E4957"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "1A2C72E9-93AA-4670-B0B5-4016E442DFDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:fw114wwb07_h2ab:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E063822-8CED-46B3-BE66-7AD18F02FAC8"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +102,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -125,8 +130,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-14427",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-09-13T17:29:00.807",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-11-08T21:16:31.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,9 +85,14 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-850l_firmware:*:beta1:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "269739B0-7349-4225-81D8-28CA494E4957"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "1A2C72E9-93AA-4670-B0B5-4016E442DFDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:fw114wwb07_h2ab:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E063822-8CED-46B3-BE66-7AD18F02FAC8"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +102,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -125,8 +130,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-14428",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-09-13T17:29:00.837",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-11-08T21:16:45.750",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,9 +85,14 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-850l_firmware:*:beta1:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "269739B0-7349-4225-81D8-28CA494E4957"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "1A2C72E9-93AA-4670-B0B5-4016E442DFDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:fw114wwb07_h2ab:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E063822-8CED-46B3-BE66-7AD18F02FAC8"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +102,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -125,8 +130,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-14429",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-09-13T17:29:00.870",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-11-08T21:17:08.127",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,9 +85,14 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-850l_firmware:*:beta1:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "269739B0-7349-4225-81D8-28CA494E4957"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "1A2C72E9-93AA-4670-B0B5-4016E442DFDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:fw114wwb07_h2ab:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E063822-8CED-46B3-BE66-7AD18F02FAC8"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +102,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -125,8 +130,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-14430",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-09-13T17:29:00.900",
|
||||
"lastModified": "2017-09-20T15:29:48.513",
|
||||
"lastModified": "2023-11-08T21:17:28.900",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,9 +85,14 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-850l_firmware:*:beta1:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "269739B0-7349-4225-81D8-28CA494E4957"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "fw114wwb07_h2ab",
|
||||
"matchCriteriaId": "1A2C72E9-93AA-4670-B0B5-4016E442DFDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-850l_firmware:fw114wwb07_h2ab:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E063822-8CED-46B3-BE66-7AD18F02FAC8"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +102,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -125,8 +130,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA74BDB0-BD40-4AFA-8FE0-3AD43894429E"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "607DDB44-0E4E-4606-8909-B624345688D4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-17065",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-11-30T17:29:00.237",
|
||||
"lastModified": "2017-12-20T20:12:52.433",
|
||||
"lastModified": "2023-11-08T21:17:52.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-605l_model_b_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-605l_model_b_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "fw2.11betab06_hbrf",
|
||||
"matchCriteriaId": "A87C0AA8-6B7C-46EE-81A8-243ED09A88DA"
|
||||
"matchCriteriaId": "7F7EBED7-D14E-4E7A-BBDA-8C40BA6AD199"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +97,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-605l_model_b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4284BC44-AE61-4248-82E0-78816F22575C"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-605l_model_b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E006579-02BA-487D-B78E-24A9777AA697"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-10822",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-10-17T14:29:00.663",
|
||||
"lastModified": "2019-01-23T14:10:13.887",
|
||||
"lastModified": "2023-11-08T22:46:32.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-116_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.06",
|
||||
"matchCriteriaId": "7E8AC627-5426-4DA2-8921-C33E858C06CD"
|
||||
"matchCriteriaId": "B75F8993-E3DE-4E8E-A202-F65B73BCBE4B"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +97,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-116:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F92862F8-D605-4FA3-87B4-C4EB5979A82C"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-116:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B307E277-9C31-4D69-B4E2-4FE28B2E2AE3"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -113,9 +113,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-140l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-140l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.02",
|
||||
"matchCriteriaId": "C737051A-1AC8-4DE1-8664-87CEDBDA1CFC"
|
||||
"matchCriteriaId": "DB18157B-E01A-436D-BE12-67F98EED68E3"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -125,8 +125,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-140l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1777229-2C2E-4931-892E-D5EA31AA895D"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-140l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB31E266-B075-42EA-891D-B4EB8E800091"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -141,9 +141,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-640l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-640l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.02",
|
||||
"matchCriteriaId": "F4FEFF42-1C16-401D-84C9-C826B883886E"
|
||||
"matchCriteriaId": "C5749C6C-2149-4BE0-971D-B01897BEC22D"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -153,8 +153,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-640l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "01CB7BDB-BD3B-4824-8460-0E6DBED0F44C"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-640l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "420C6BC9-082D-47D7-9612-553B3B8EEBBA"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -169,9 +169,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-512_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-512_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.02",
|
||||
"matchCriteriaId": "1983E765-F51D-4F90-BFD9-7CDB8CC328BA"
|
||||
"matchCriteriaId": "41CAC2C7-FAC8-48DA-B28E-8112209B8898"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -181,8 +181,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-512:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0B55881-51F3-4C74-B717-83EB7B5BA569"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-512:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "90DE6771-50FB-492D-B931-193BB9286B52"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -197,9 +197,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-712_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-712_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.02",
|
||||
"matchCriteriaId": "8DC922A6-53E8-4480-AD27-0F309D961E63"
|
||||
"matchCriteriaId": "EB35A612-8DBD-46BD-80C5-4CA982D414C6"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -209,8 +209,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-712:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E67682F4-79AD-4DF3-9E63-C2070C73510C"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-712:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F45AFE88-4369-4CD5-BFC0-69AF3DF0A77A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -225,9 +225,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-912_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-912_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.02",
|
||||
"matchCriteriaId": "B0CD502A-C47A-4052-A408-364449878B01"
|
||||
"matchCriteriaId": "37FEC076-CCD2-4153-9E49-50F6BE0E4F8E"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -237,8 +237,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-912:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8182D4FA-4FE0-477E-938E-23E4B177973F"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43F0390E-B9E1-463A-A08C-B529778EE72F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -253,9 +253,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-921_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-921_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.02",
|
||||
"matchCriteriaId": "D21EDD04-C8BA-4D8A-B7F3-7BFF78DD27F6"
|
||||
"matchCriteriaId": "98B01219-1B35-45CF-AD67-53E59C5A2C99"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -265,8 +265,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-921:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FE10937-67B8-4F8D-9C1D-8A5C5785B968"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43F0390E-B9E1-463A-A08C-B529778EE72F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -281,9 +281,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-111_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-111_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.01",
|
||||
"matchCriteriaId": "403F699B-7AD6-42FE-AEBF-6F4E805A94D8"
|
||||
"matchCriteriaId": "16948147-16DB-4365-A4EC-3F5B4298B564"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -293,8 +293,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-111:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81E13F9E-2224-44ED-A919-ADD77F10A31C"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-111:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3B810AA-0D3A-439F-8AD9-D42CB368343B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-10823",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-10-17T14:29:00.787",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-11-08T22:46:49.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-116_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.06",
|
||||
"matchCriteriaId": "7E8AC627-5426-4DA2-8921-C33E858C06CD"
|
||||
"matchCriteriaId": "B75F8993-E3DE-4E8E-A202-F65B73BCBE4B"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +97,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-116:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F92862F8-D605-4FA3-87B4-C4EB5979A82C"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-116:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B307E277-9C31-4D69-B4E2-4FE28B2E2AE3"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -113,9 +113,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-512_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-512_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.02",
|
||||
"matchCriteriaId": "1983E765-F51D-4F90-BFD9-7CDB8CC328BA"
|
||||
"matchCriteriaId": "41CAC2C7-FAC8-48DA-B28E-8112209B8898"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -125,8 +125,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-512:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0B55881-51F3-4C74-B717-83EB7B5BA569"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-512:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "90DE6771-50FB-492D-B931-193BB9286B52"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -141,9 +141,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-912_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-912_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.02",
|
||||
"matchCriteriaId": "B0CD502A-C47A-4052-A408-364449878B01"
|
||||
"matchCriteriaId": "37FEC076-CCD2-4153-9E49-50F6BE0E4F8E"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -153,8 +153,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-912:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8182D4FA-4FE0-477E-938E-23E4B177973F"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43F0390E-B9E1-463A-A08C-B529778EE72F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -169,9 +169,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-111_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-111_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.01",
|
||||
"matchCriteriaId": "403F699B-7AD6-42FE-AEBF-6F4E805A94D8"
|
||||
"matchCriteriaId": "16948147-16DB-4365-A4EC-3F5B4298B564"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -181,8 +181,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-111:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81E13F9E-2224-44ED-A919-ADD77F10A31C"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-111:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3B810AA-0D3A-439F-8AD9-D42CB368343B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-10824",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-10-17T14:29:00.930",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-11-08T22:47:08.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -89,9 +89,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-116_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.06",
|
||||
"matchCriteriaId": "7E8AC627-5426-4DA2-8921-C33E858C06CD"
|
||||
"matchCriteriaId": "B75F8993-E3DE-4E8E-A202-F65B73BCBE4B"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -101,8 +101,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-116:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F92862F8-D605-4FA3-87B4-C4EB5979A82C"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-116:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B307E277-9C31-4D69-B4E2-4FE28B2E2AE3"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -117,9 +117,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-140l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-140l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.02",
|
||||
"matchCriteriaId": "C737051A-1AC8-4DE1-8664-87CEDBDA1CFC"
|
||||
"matchCriteriaId": "DB18157B-E01A-436D-BE12-67F98EED68E3"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -129,8 +129,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-140l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1777229-2C2E-4931-892E-D5EA31AA895D"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-140l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB31E266-B075-42EA-891D-B4EB8E800091"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -145,9 +145,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-640l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-640l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.02",
|
||||
"matchCriteriaId": "F4FEFF42-1C16-401D-84C9-C826B883886E"
|
||||
"matchCriteriaId": "C5749C6C-2149-4BE0-971D-B01897BEC22D"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -157,8 +157,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-640l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "01CB7BDB-BD3B-4824-8460-0E6DBED0F44C"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-640l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "420C6BC9-082D-47D7-9612-553B3B8EEBBA"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -173,9 +173,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-512_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-512_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.02",
|
||||
"matchCriteriaId": "1983E765-F51D-4F90-BFD9-7CDB8CC328BA"
|
||||
"matchCriteriaId": "41CAC2C7-FAC8-48DA-B28E-8112209B8898"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -185,8 +185,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-512:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0B55881-51F3-4C74-B717-83EB7B5BA569"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-512:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "90DE6771-50FB-492D-B931-193BB9286B52"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -201,9 +201,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-712_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-712_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.02",
|
||||
"matchCriteriaId": "8DC922A6-53E8-4480-AD27-0F309D961E63"
|
||||
"matchCriteriaId": "EB35A612-8DBD-46BD-80C5-4CA982D414C6"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -213,8 +213,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-712:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E67682F4-79AD-4DF3-9E63-C2070C73510C"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-712:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F45AFE88-4369-4CD5-BFC0-69AF3DF0A77A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -229,9 +229,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-912_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-912_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.02",
|
||||
"matchCriteriaId": "B0CD502A-C47A-4052-A408-364449878B01"
|
||||
"matchCriteriaId": "37FEC076-CCD2-4153-9E49-50F6BE0E4F8E"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -241,8 +241,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-912:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8182D4FA-4FE0-477E-938E-23E4B177973F"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43F0390E-B9E1-463A-A08C-B529778EE72F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -257,9 +257,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-921_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-921_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.02",
|
||||
"matchCriteriaId": "D21EDD04-C8BA-4D8A-B7F3-7BFF78DD27F6"
|
||||
"matchCriteriaId": "98B01219-1B35-45CF-AD67-53E59C5A2C99"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -269,8 +269,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-921:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FE10937-67B8-4F8D-9C1D-8A5C5785B968"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43F0390E-B9E1-463A-A08C-B529778EE72F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -285,9 +285,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dwr-111_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dwr-111_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.01",
|
||||
"matchCriteriaId": "403F699B-7AD6-42FE-AEBF-6F4E805A94D8"
|
||||
"matchCriteriaId": "16948147-16DB-4365-A4EC-3F5B4298B564"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -297,8 +297,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dwr-111:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81E13F9E-2224-44ED-A919-ADD77F10A31C"
|
||||
"criteria": "cpe:2.3:h:dlink:dwr-111:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3B810AA-0D3A-439F-8AD9-D42CB368343B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-6527",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-03-06T20:29:00.780",
|
||||
"lastModified": "2018-03-27T20:30:32.667",
|
||||
"lastModified": "2023-11-08T21:18:08.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-860l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-860l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "a1_fw110b04",
|
||||
"matchCriteriaId": "FF5B062B-77AD-42BD-899F-A1A57F7C79E5"
|
||||
"matchCriteriaId": "3887A644-753A-4CA3-9D79-0718057EEB3B"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +97,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-860l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86D36E43-3E85-4A16-AE88-A4CB410DE1DC"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-860l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCDB9720-8F5A-4F02-A436-920CDAC15D69"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -113,9 +113,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-865l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-865l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "reva_firmware_patch_1.08.b01",
|
||||
"matchCriteriaId": "C905D793-1253-4401-B11E-DA01823BE00B"
|
||||
"matchCriteriaId": "0624940E-9466-40BA-97E4-648537A092C0"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -125,8 +125,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-865l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "980D0CE6-9155-49F6-BCA2-D440B7D7A785"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-865l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3A853DF-6DF1-4E8E-8D55-95279EE0CB30"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -141,9 +141,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-868l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-868l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "a1_fw112b04",
|
||||
"matchCriteriaId": "C250B369-1C07-4CB0-9DCD-AACB349B49A4"
|
||||
"matchCriteriaId": "DE2D4824-B834-41EA-8F70-AF12720030C9"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -153,8 +153,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-868l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F2CDA4B-ACDD-43BD-B5BD-9EEB211B01F8"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33B501D4-BDDD-485E-A5A3-8AA8D5E46061"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-6528",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-03-06T20:29:00.843",
|
||||
"lastModified": "2018-03-27T20:27:13.053",
|
||||
"lastModified": "2023-11-08T21:18:30.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-860l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-860l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "a1_fw110b04",
|
||||
"matchCriteriaId": "FF5B062B-77AD-42BD-899F-A1A57F7C79E5"
|
||||
"matchCriteriaId": "3887A644-753A-4CA3-9D79-0718057EEB3B"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +97,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-860l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86D36E43-3E85-4A16-AE88-A4CB410DE1DC"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-860l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCDB9720-8F5A-4F02-A436-920CDAC15D69"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -113,9 +113,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-865l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-865l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "reva_firmware_patch_1.08.b01",
|
||||
"matchCriteriaId": "C905D793-1253-4401-B11E-DA01823BE00B"
|
||||
"matchCriteriaId": "0624940E-9466-40BA-97E4-648537A092C0"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -125,8 +125,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-865l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "980D0CE6-9155-49F6-BCA2-D440B7D7A785"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-865l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3A853DF-6DF1-4E8E-8D55-95279EE0CB30"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -141,9 +141,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-868l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-868l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "a1_fw112b04",
|
||||
"matchCriteriaId": "C250B369-1C07-4CB0-9DCD-AACB349B49A4"
|
||||
"matchCriteriaId": "DE2D4824-B834-41EA-8F70-AF12720030C9"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -153,8 +153,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-868l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F2CDA4B-ACDD-43BD-B5BD-9EEB211B01F8"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33B501D4-BDDD-485E-A5A3-8AA8D5E46061"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-6529",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-03-06T20:29:00.907",
|
||||
"lastModified": "2018-03-27T20:29:54.117",
|
||||
"lastModified": "2023-11-08T21:18:46.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-860l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-860l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "a1_fw110b04",
|
||||
"matchCriteriaId": "FF5B062B-77AD-42BD-899F-A1A57F7C79E5"
|
||||
"matchCriteriaId": "3887A644-753A-4CA3-9D79-0718057EEB3B"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +97,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-860l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86D36E43-3E85-4A16-AE88-A4CB410DE1DC"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-860l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCDB9720-8F5A-4F02-A436-920CDAC15D69"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -113,9 +113,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-865l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-865l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "reva_firmware_patch_1.08.b01",
|
||||
"matchCriteriaId": "C905D793-1253-4401-B11E-DA01823BE00B"
|
||||
"matchCriteriaId": "0624940E-9466-40BA-97E4-648537A092C0"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -125,8 +125,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-865l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "980D0CE6-9155-49F6-BCA2-D440B7D7A785"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-865l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3A853DF-6DF1-4E8E-8D55-95279EE0CB30"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -141,9 +141,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-868l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-868l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "a1_fw112b04",
|
||||
"matchCriteriaId": "C250B369-1C07-4CB0-9DCD-AACB349B49A4"
|
||||
"matchCriteriaId": "DE2D4824-B834-41EA-8F70-AF12720030C9"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -153,8 +153,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-868l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F2CDA4B-ACDD-43BD-B5BD-9EEB211B01F8"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33B501D4-BDDD-485E-A5A3-8AA8D5E46061"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-6530",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-03-06T20:29:00.987",
|
||||
"lastModified": "2018-03-27T18:09:50.887",
|
||||
"lastModified": "2023-11-08T21:19:01.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2022-09-08",
|
||||
"cisaActionDue": "2022-09-29",
|
||||
@ -19,13 +19,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -89,9 +89,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-860l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-860l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "a1_fw110b04",
|
||||
"matchCriteriaId": "FF5B062B-77AD-42BD-899F-A1A57F7C79E5"
|
||||
"matchCriteriaId": "3887A644-753A-4CA3-9D79-0718057EEB3B"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -101,8 +101,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-860l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86D36E43-3E85-4A16-AE88-A4CB410DE1DC"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-860l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCDB9720-8F5A-4F02-A436-920CDAC15D69"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -117,9 +117,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-865l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-865l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "reva_firmware_patch_1.08.b01",
|
||||
"matchCriteriaId": "C905D793-1253-4401-B11E-DA01823BE00B"
|
||||
"matchCriteriaId": "0624940E-9466-40BA-97E4-648537A092C0"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -129,8 +129,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-865l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "980D0CE6-9155-49F6-BCA2-D440B7D7A785"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-865l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3A853DF-6DF1-4E8E-8D55-95279EE0CB30"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -145,9 +145,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-868l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-868l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "a1_fw112b04",
|
||||
"matchCriteriaId": "C250B369-1C07-4CB0-9DCD-AACB349B49A4"
|
||||
"matchCriteriaId": "DE2D4824-B834-41EA-8F70-AF12720030C9"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -157,8 +157,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-868l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F2CDA4B-ACDD-43BD-B5BD-9EEB211B01F8"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33B501D4-BDDD-485E-A5A3-8AA8D5E46061"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -173,9 +173,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-880l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-880l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "reva_firmware_patch_1.08b04",
|
||||
"matchCriteriaId": "320DD699-5A17-4F48-AC85-FC28EEB4CA1E"
|
||||
"matchCriteriaId": "2E9B68DE-D3A7-4973-9D47-7203B2190F82"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -185,8 +185,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-880l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8CEEFE9E-3573-46BE-837E-CCF2C9E6BEDA"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-880l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC772491-6371-4712-B358-E74D9C5062FD"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9284",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-04-04T19:29:00.597",
|
||||
"lastModified": "2018-05-22T13:17:45.813",
|
||||
"lastModified": "2023-11-08T21:19:17.763",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:singapore_starhub_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:singapore_starhub_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.21shcb03",
|
||||
"matchCriteriaId": "5C3CE0FB-575E-45E2-BF2C-6D2A69DC0E60"
|
||||
"matchCriteriaId": "80D848C7-32C6-4A54-BD4A-B99A773FADC1"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +97,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-868l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F2CDA4B-ACDD-43BD-B5BD-9EEB211B01F8"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33B501D4-BDDD-485E-A5A3-8AA8D5E46061"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-15655",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-03-19T18:15:13.787",
|
||||
"lastModified": "2021-07-21T11:39:23.747",
|
||||
"lastModified": "2023-11-08T22:48:12.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -89,9 +89,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dsl-2875al_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dsl-2875al_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.00.05",
|
||||
"matchCriteriaId": "4A3A89DE-6065-4466-B730-25F61FBA4D15"
|
||||
"matchCriteriaId": "F73F2C43-EA43-43F8-9877-6E5428C211FE"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -101,8 +101,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dsl-2875al:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19097803-33B0-4DBB-942A-A008067BE577"
|
||||
"criteria": "cpe:2.3:h:dlink:dsl-2875al:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E4E8D18-F80D-42A3-8142-8519B8D35078"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-15656",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-03-19T18:15:13.867",
|
||||
"lastModified": "2021-07-21T11:39:23.747",
|
||||
"lastModified": "2023-11-08T22:48:35.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -89,9 +89,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dsl-2875al_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dsl-2875al_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.00.05",
|
||||
"matchCriteriaId": "4A3A89DE-6065-4466-B730-25F61FBA4D15"
|
||||
"matchCriteriaId": "F73F2C43-EA43-43F8-9877-6E5428C211FE"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -101,8 +101,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dsl-2875al:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19097803-33B0-4DBB-942A-A008067BE577"
|
||||
"criteria": "cpe:2.3:h:dlink:dsl-2875al:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E4E8D18-F80D-42A3-8142-8519B8D35078"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -129,8 +129,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dsl-2877al:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59E20292-DAF1-4B93-B5C3-0E8D4C60FD18"
|
||||
"criteria": "cpe:2.3:h:dlink:dsl-2877al:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E30198E-E2F1-4A28-BA55-2C22DCFA5B72"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-9123",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-02-25T05:29:01.240",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"lastModified": "2023-11-08T22:47:29.620",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-825_rev.b_firmware:2.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5223C4FF-FA63-41CE-BD4C-0880F07F0635"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-825_rev.b_firmware:2.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CFFFA7B9-BD99-4E85-8F45-32B46F6FAEFE"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -96,8 +96,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-825_rev.b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5EB8EE3-D483-40AD-94DD-13CD94F83809"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825_rev.b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CDEF189-EEEF-40C9-BE55-9A051D783CDC"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-9126",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-02-25T05:29:01.503",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"lastModified": "2023-11-08T22:47:49.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-825_rev.b_firmware:2.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5223C4FF-FA63-41CE-BD4C-0880F07F0635"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-825_rev.b_firmware:2.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CFFFA7B9-BD99-4E85-8F45-32B46F6FAEFE"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -96,8 +96,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-825_rev.b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5EB8EE3-D483-40AD-94DD-13CD94F83809"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-825_rev.b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CDEF189-EEEF-40C9-BE55-9A051D783CDC"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-15892",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-07-22T19:15:12.477",
|
||||
"lastModified": "2021-07-21T11:39:23.747",
|
||||
"lastModified": "2023-11-08T22:49:01.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -89,9 +89,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dap-1520_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dap-1520_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.10b04",
|
||||
"matchCriteriaId": "9BF87ECE-5925-4DDA-9F93-69F16C4024AD"
|
||||
"matchCriteriaId": "EECD7723-759E-499C-A784-47C3021D0E2D"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -101,8 +101,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dap-1520:a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2BB30EB6-9DC6-4CE3-A289-44A64C481A90"
|
||||
"criteria": "cpe:2.3:h:dlink:dap-1520:a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FBCD8191-9FE0-455F-B85E-ECE69D678F8C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-15893",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-07-22T19:15:12.553",
|
||||
"lastModified": "2020-07-24T20:08:02.997",
|
||||
"lastModified": "2023-11-08T22:49:34.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,13 +85,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-816l_firmware:2.06:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F330A61A-BA52-4E6D-94FD-CF13865209C6"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-816l_firmware:2.06:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1817EE29-D782-4A98-A478-20BDA559C5CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-816l_firmware:2.06.b09:beta:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABD5EB5D-8518-4BF2-8FFA-208D8826FCEE"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-816l_firmware:2.06.b09:beta:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABE7E66F-20B2-4A39-A845-03E5FBBD9E2A"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -101,8 +101,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-816l:b1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB0ABDCF-4D9F-4E3C-9DEB-C6B183F974B8"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-816l:b1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "637B2D4B-0EA7-4E30-9B2B-77484D701042"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-15894",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-07-22T19:15:12.710",
|
||||
"lastModified": "2021-07-21T11:39:23.747",
|
||||
"lastModified": "2023-11-08T22:49:55.577",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,13 +85,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-816l_firmware:2.06:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F330A61A-BA52-4E6D-94FD-CF13865209C6"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-816l_firmware:2.06:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1817EE29-D782-4A98-A478-20BDA559C5CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-816l_firmware:2.06.b09:beta:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABD5EB5D-8518-4BF2-8FFA-208D8826FCEE"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-816l_firmware:2.06.b09:beta:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABE7E66F-20B2-4A39-A845-03E5FBBD9E2A"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -101,8 +101,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-816l:b1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB0ABDCF-4D9F-4E3C-9DEB-C6B183F974B8"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-816l:b1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "637B2D4B-0EA7-4E30-9B2B-77484D701042"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-15895",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-07-22T19:15:12.833",
|
||||
"lastModified": "2020-07-24T18:58:54.763",
|
||||
"lastModified": "2023-11-08T22:50:33.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,13 +85,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-816l_firmware:2.06:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F330A61A-BA52-4E6D-94FD-CF13865209C6"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-816l_firmware:2.06:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1817EE29-D782-4A98-A478-20BDA559C5CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-816l_firmware:2.06.b09:beta:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABD5EB5D-8518-4BF2-8FFA-208D8826FCEE"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-816l_firmware:2.06.b09:beta:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABE7E66F-20B2-4A39-A845-03E5FBBD9E2A"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -101,8 +101,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dir-816l:b1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB0ABDCF-4D9F-4E3C-9DEB-C6B183F974B8"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-816l:b1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "637B2D4B-0EA7-4E30-9B2B-77484D701042"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-25078",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-09-02T16:15:12.627",
|
||||
"lastModified": "2020-09-11T20:42:10.533",
|
||||
"lastModified": "2023-11-08T22:50:55.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dcs-2530l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dcs-2530l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.05.05",
|
||||
"matchCriteriaId": "3842F6AB-9C4E-4838-9838-39043FAD7FE7"
|
||||
"matchCriteriaId": "93C1E07C-D4C7-4CB2-B0F7-01F838A3555B"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -97,8 +97,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dcs-2530l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC420CF5-A8D2-4D6D-8750-D86E22D867A5"
|
||||
"criteria": "cpe:2.3:h:dlink:dcs-2530l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40A05FF4-4847-41C2-946A-F8043481E11F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -113,9 +113,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dcs-2670l_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dcs-2670l_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.02",
|
||||
"matchCriteriaId": "5F8F139D-C2CB-406D-92E0-2866E4809D3E"
|
||||
"matchCriteriaId": "FD06916A-B4D7-4E0F-8007-A97BB3B1D44B"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -125,8 +125,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dcs-2670l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71C8F5B0-817D-4F4F-92FB-BA152924B2B0"
|
||||
"criteria": "cpe:2.3:h:dlink:dcs-2670l:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F66D7CA9-66E1-4A37-88AA-2E98DC0416C0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-27248",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2021-04-14T16:15:13.360",
|
||||
"lastModified": "2021-04-22T20:30:26.993",
|
||||
"lastModified": "2023-11-08T22:51:28.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -107,8 +107,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dap-2020_firmware:1.01:rc001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B1C1760D-9A5F-424F-91FF-C9122E30F4B9"
|
||||
"criteria": "cpe:2.3:o:dlink:dap-2020_firmware:1.01:rc001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0962F7C-1425-478D-9E83-D6560578DFA6"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -118,8 +118,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dap-2020:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6456E3E3-F6F1-4B49-B213-27FDDB8D0E40"
|
||||
"criteria": "cpe:2.3:h:dlink:dap-2020:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9FF47C9-C3D0-4F84-92A7-FCAA390F4AD0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-27249",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2021-04-14T16:15:13.453",
|
||||
"lastModified": "2021-04-22T20:34:06.243",
|
||||
"lastModified": "2023-11-08T22:53:23.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -107,8 +107,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dap-2020_firmware:1.01:rc001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B1C1760D-9A5F-424F-91FF-C9122E30F4B9"
|
||||
"criteria": "cpe:2.3:o:dlink:dap-2020_firmware:1.01:rc001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0962F7C-1425-478D-9E83-D6560578DFA6"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -118,8 +118,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dap-2020:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6456E3E3-F6F1-4B49-B213-27FDDB8D0E40"
|
||||
"criteria": "cpe:2.3:h:dlink:dap-2020:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9FF47C9-C3D0-4F84-92A7-FCAA390F4AD0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-27250",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2021-04-14T16:15:13.533",
|
||||
"lastModified": "2021-04-22T20:49:45.323",
|
||||
"lastModified": "2023-11-08T22:58:36.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -107,8 +107,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dap-2020_firmware:1.01:rc001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B1C1760D-9A5F-424F-91FF-C9122E30F4B9"
|
||||
"criteria": "cpe:2.3:o:dlink:dap-2020_firmware:1.01:rc001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0962F7C-1425-478D-9E83-D6560578DFA6"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -118,8 +118,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:d-link:dap-2020:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6456E3E3-F6F1-4B49-B213-27FDDB8D0E40"
|
||||
"criteria": "cpe:2.3:h:dlink:dap-2020:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9FF47C9-C3D0-4F84-92A7-FCAA390F4AD0"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-41723",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2023-02-28T18:15:09.980",
|
||||
"lastModified": "2023-05-16T10:50:02.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-08T22:15:07.997",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -41,7 +41,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -145,6 +145,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "security@golang.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43619",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:19.143",
|
||||
"lastModified": "2023-11-08T13:30:00.990",
|
||||
"lastModified": "2023-11-08T22:58:53.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,9 +88,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-1935_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-1935_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.02",
|
||||
"matchCriteriaId": "82F30744-BA05-420C-828A-C270A05560AD"
|
||||
"matchCriteriaId": "4A6AE595-FF06-4B38-AF86-0B9B180F1DC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43620",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:19.207",
|
||||
"lastModified": "2023-11-08T13:30:00.990",
|
||||
"lastModified": "2023-11-08T22:59:10.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -78,9 +78,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-1935_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-1935_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.02",
|
||||
"matchCriteriaId": "82F30744-BA05-420C-828A-C270A05560AD"
|
||||
"matchCriteriaId": "4A6AE595-FF06-4B38-AF86-0B9B180F1DC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43621",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:19.270",
|
||||
"lastModified": "2023-11-08T13:30:00.990",
|
||||
"lastModified": "2023-11-08T22:59:29.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -78,9 +78,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-1935_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-1935_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.02",
|
||||
"matchCriteriaId": "82F30744-BA05-420C-828A-C270A05560AD"
|
||||
"matchCriteriaId": "4A6AE595-FF06-4B38-AF86-0B9B180F1DC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43622",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:19.333",
|
||||
"lastModified": "2023-11-08T13:30:00.990",
|
||||
"lastModified": "2023-11-08T22:59:54.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -78,9 +78,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:d-link:dir-1935_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:dlink:dir-1935_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.02",
|
||||
"matchCriteriaId": "82F30744-BA05-420C-828A-C270A05560AD"
|
||||
"matchCriteriaId": "4A6AE595-FF06-4B38-AF86-0B9B180F1DC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0001",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2023-02-08T18:15:11.523",
|
||||
"lastModified": "2023-11-08T15:15:08.020",
|
||||
"lastModified": "2023-11-08T21:15:08.247",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -116,6 +116,10 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/11/08/3",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/11/08/5",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2023-0001",
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
|
32
CVE-2023/CVE-2023-03xx/CVE-2023-0392.json
Normal file
32
CVE-2023/CVE-2023-03xx/CVE-2023-0392.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-0392",
|
||||
"sourceIdentifier": "psirt@okta.com",
|
||||
"published": "2023-11-08T21:15:08.353",
|
||||
"lastModified": "2023-11-08T21:15:08.353",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LDAP Agent Update service with versions prior to 5.18 used an unquoted path, which could allow arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@okta.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-428"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://trust.okta.com/security-advisories/okta-ldap-agent-cve-2023-0392",
|
||||
"source": "psirt@okta.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2033",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-04-14T19:15:09.453",
|
||||
"lastModified": "2023-10-20T20:51:57.363",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-08T22:15:08.880",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-04-17",
|
||||
"cisaActionDue": "2023-05-08",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -173,6 +173,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5390",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21930",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:13.883",
|
||||
"lastModified": "2023-09-19T11:15:48.183",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-08T22:15:08.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -122,6 +122,10 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5430",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21937",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:14.507",
|
||||
"lastModified": "2023-09-19T11:15:52.827",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-08T22:15:08.247",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -122,6 +122,10 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5430",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21938",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:14.603",
|
||||
"lastModified": "2023-09-19T11:15:54.207",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-08T22:15:08.343",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -122,6 +122,10 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5430",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21939",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:14.690",
|
||||
"lastModified": "2023-09-19T11:15:58.340",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-08T22:15:08.440",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -122,6 +122,10 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5430",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21954",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:15.630",
|
||||
"lastModified": "2023-09-19T11:16:00.160",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-08T22:15:08.540",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -112,6 +112,10 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5430",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21967",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:16.397",
|
||||
"lastModified": "2023-10-26T20:22:35.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-08T22:15:08.630",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -189,6 +189,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5430",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21968",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-04-18T20:15:16.470",
|
||||
"lastModified": "2023-09-19T11:16:04.230",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-08T22:15:08.750",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -510,6 +510,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5430",
|
||||
"source": "secalert_us@oracle.com"
|
||||
|
20
CVE-2023/CVE-2023-299xx/CVE-2023-29974.json
Normal file
20
CVE-2023/CVE-2023-299xx/CVE-2023-29974.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-29974",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-08T21:15:08.447",
|
||||
"lastModified": "2023-11-08T21:15:08.447",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue discovered in Pfsense CE version 2.6.0 allows attackers to compromise user accounts via weak password requirements."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esecforte.com/cve-2023-29974-weak-password-policy/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3079",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-06-05T22:15:12.383",
|
||||
"lastModified": "2023-06-17T04:15:45.680",
|
||||
"lastModified": "2023-11-08T22:15:09.110",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-06-07",
|
||||
"cisaActionDue": "2023-06-28",
|
||||
@ -130,6 +130,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4OXTNIZY4JYHJT7CVLPAJQILI6BISVM/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5420",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
24
CVE-2023/CVE-2023-366xx/CVE-2023-36667.json
Normal file
24
CVE-2023/CVE-2023-366xx/CVE-2023-36667.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-36667",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-08T22:15:08.983",
|
||||
"lastModified": "2023-11-08T22:15:08.983",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Couchbase Server 7.1.4 before 7.1.5 and 7.2.0 before 7.2.1 allows Directory Traversal."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-38994",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-31T12:15:08.683",
|
||||
"lastModified": "2023-10-31T12:58:27.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-11-08T22:15:09.033",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Univention UCS v.5.0 allows a local attacker to execute arbitrary code and gain privileges via the check_univention_joinstatus function."
|
||||
"value": "The 'check_univention_joinstatus' prometheus monitoring script (and other scripts) in UCS 5.0-5 revealed the LDAP plaintext password of the machine account in the process list allowing attackers with local ssh access to gain higher privileges and perform followup attacks. By default, the configuration of UCS does not allow local ssh access for regular users."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Univention UCS v.5.0 permite a un atacante local ejecutar c\u00f3digo arbitrario y obtener privilegios a trav\u00e9s de la funci\u00f3n check_univention_joinstatus."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
55
CVE-2023/CVE-2023-435xx/CVE-2023-43567.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43567.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43567",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-11-08T22:15:09.200",
|
||||
"lastModified": "2023-11-08T22:15:09.200",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow was reported in the LemSecureBootForceKey module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to execute arbitrary code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-141775",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-435xx/CVE-2023-43568.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43568.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43568",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-11-08T22:15:09.473",
|
||||
"lastModified": "2023-11-08T22:15:09.473",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer over-read was reported in the LemSecureBootForceKey module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to disclose sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-126"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-141775",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-435xx/CVE-2023-43569.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43569.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43569",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-11-08T22:15:09.820",
|
||||
"lastModified": "2023-11-08T22:15:09.820",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow was reported in the OemSmi module in some Lenovo Desktop products that may allow a local attacker with elevated privileges to execute arbitrary code.\u00a0"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-141775",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-435xx/CVE-2023-43570.json
Normal file
55
CVE-2023/CVE-2023-435xx/CVE-2023-43570.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-43570",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-11-08T22:15:10.113",
|
||||
"lastModified": "2023-11-08T22:15:10.113",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nA potential vulnerability was reported in the SMI callback function of the OemSmi driver that may allow a local attacker with elevated permissions to execute arbitrary code. \n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-141775",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-458xx/CVE-2023-45857.json
Normal file
20
CVE-2023/CVE-2023-458xx/CVE-2023-45857.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-45857",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-08T21:15:08.550",
|
||||
"lastModified": "2023-11-08T21:15:08.550",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/axios/axios/issues/6006",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-458xx/CVE-2023-45875.json
Normal file
28
CVE-2023/CVE-2023-458xx/CVE-2023-45875.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-45875",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-08T21:15:08.587",
|
||||
"lastModified": "2023-11-08T21:15:08.587",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Couchbase Server 7.2.0. There is a private key leak in debug.log while adding a pre-7.0 node to a 7.2 cluster."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://forums.couchbase.com/tags/security",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-463xx/CVE-2023-46362.json
Normal file
24
CVE-2023/CVE-2023-463xx/CVE-2023-46362.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-46362",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-08T21:15:08.633",
|
||||
"lastModified": "2023-11-08T21:15:08.633",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "jbig2enc v0.28 was discovered to contain a heap-use-after-free via jbig2enc_auto_threshold_using_hash in src/jbig2enc.cc."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/agl/jbig2enc",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/agl/jbig2enc/issues/84",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-463xx/CVE-2023-46363.json
Normal file
24
CVE-2023/CVE-2023-463xx/CVE-2023-46363.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-46363",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-08T21:15:08.673",
|
||||
"lastModified": "2023-11-08T21:15:08.673",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "jbig2enc v0.28 was discovered to contain a SEGV via jbig2_add_page in src/jbig2enc.cc:512."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/agl/jbig2enc",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/agl/jbig2enc/issues/85",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-46xx/CVE-2023-4632.json
Normal file
55
CVE-2023/CVE-2023-46xx/CVE-2023-4632.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-4632",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-11-08T22:15:11.210",
|
||||
"lastModified": "2023-11-08T22:15:11.210",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An uncontrolled search path vulnerability was reported in Lenovo System Update that could allow an attacker with local access to execute code with elevated privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-135367",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2023/CVE-2023-471xx/CVE-2023-47109.json
Normal file
67
CVE-2023/CVE-2023-471xx/CVE-2023-47109.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-47109",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-11-08T22:15:10.423",
|
||||
"lastModified": "2023-11-08T22:15:10.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PrestaShop blockreassurance adds an information block aimed at offering helpful information to reassure customers that the store is trustworthy. When adding a block in blockreassurance module, a BO user can modify the http request and give the path of any file in the project instead of an image. When deleting the block from the BO, the file will be deleted. It is possible to make the website completely unavailable by removing index.php for example. This issue has been patched in version 5.1.4.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PrestaShop/blockreassurance/commit/2d0e97bebf795690caffe33c1ab23a9bf43fcdfa",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PrestaShop/blockreassurance/commit/eec00da564db4c1804b0a0d1e3d9f7ec4e27d823",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PrestaShop/blockreassurance/releases/tag/v5.1.4",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PrestaShop/blockreassurance/security/advisories/GHSA-83j2-qhx2-p7jc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2023/CVE-2023-471xx/CVE-2023-47111.json
Normal file
67
CVE-2023/CVE-2023-471xx/CVE-2023-47111.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-47111",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-11-08T22:15:10.657",
|
||||
"lastModified": "2023-11-08T22:15:10.657",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ZITADEL provides identity infrastructure. ZITADEL provides administrators the possibility to define a `Lockout Policy` with a maximum amount of failed password check attempts. On every failed password check, the amount of failed checks is compared against the configured maximum. Exceeding the limit, will lock the user and prevent further authentication. In the affected implementation it was possible for an attacker to start multiple parallel password checks, giving him the possibility to try out more combinations than configured in the `Lockout Policy`. This vulnerability has been patched in versions 2.40.5 and 2.38.3.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/commit/22e2d5599918864877e054ebe82fb834a5aa1077",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.38.3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.40.5",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-7h8m-vrxx-vr4m",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-471xx/CVE-2023-47113.json
Normal file
55
CVE-2023/CVE-2023-471xx/CVE-2023-47113.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47113",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-11-08T22:15:10.843",
|
||||
"lastModified": "2023-11-08T22:15:10.843",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BleachBit cleans files to free disk space and to maintain privacy. BleachBit for Windows up to version 4.4.2 is vulnerable to a DLL Hijacking vulnerability. By placing a DLL in the Folder c:\\DLLs, an attacker can run arbitrary code on every execution of BleachBit for Windows. This issue has been patched in version 4.5.0.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/bleachbit/bleachbit/security/advisories/GHSA-j8jc-f6p7-55p8",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2023/CVE-2023-471xx/CVE-2023-47114.json
Normal file
63
CVE-2023/CVE-2023-471xx/CVE-2023-47114.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-47114",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-11-08T22:15:11.023",
|
||||
"lastModified": "2023-11-08T22:15:11.023",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in your runtime environment, and the enforcement of privacy regulations in your code. The Fides web application allows data subject users to request access to their personal data. If the request is approved by the data controller user operating the Fides web application, the data subject's personal data can then retrieved from connected systems and data stores before being bundled together as a data subject access request package for the data subject to download. Supported data formats for the package include json and csv, but the most commonly used format is a series of HTML files compressed in a ZIP file. Once downloaded and unzipped, the data subject user can browse the HTML files on their local machine. It was identified that there was no validation of input coming from e.g. the connected systems and data stores which is later reflected in the downloaded data. This can result in an HTML injection that can be abused e.g. for phishing attacks or malicious JavaScript code execution, but only in the context of the data subject's browser accessing a HTML page using the `file://` protocol. Exploitation is limited to rogue Admin UI users, malicious connected system / data store users, and the data subject user if tricked via social engineering into submitting malicious data themselves. This vulnerability has been patched in version 2.23.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ethyca/fides/commit/50360a0e24aac858459806bb140bb1c4b71e67a1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ethyca/fides/releases/tag/2.23.3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ethyca/fides/security/advisories/GHSA-3vpf-mcj7-5h38",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-47xx/CVE-2023-4706.json
Normal file
55
CVE-2023/CVE-2023-47xx/CVE-2023-4706.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-4706",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-11-08T22:15:11.420",
|
||||
"lastModified": "2023-11-08T22:15:11.420",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nA privilege escalation vulnerability was reported in Lenovo preloaded devices deployed using Microsoft AutoPilot under a standard user account due to incorrect default privileges.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-127385",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-48xx/CVE-2023-4891.json
Normal file
55
CVE-2023/CVE-2023-48xx/CVE-2023-4891.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-4891",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-11-08T22:15:11.593",
|
||||
"lastModified": "2023-11-08T22:15:11.593",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nA potential use-after-free vulnerability was reported in the Lenovo View driver that could result in denial of service. \n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-135344",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-50xx/CVE-2023-5075.json
Normal file
55
CVE-2023/CVE-2023-50xx/CVE-2023-5075.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-5075",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-11-08T22:15:11.770",
|
||||
"lastModified": "2023-11-08T22:15:11.770",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow was reported in the FmpSipoCapsuleDriver driver in the IdeaPad Duet 3-10IGL5 that may allow a local attacker with elevated privileges to execute arbitrary code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-141775",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-50xx/CVE-2023-5078.json
Normal file
55
CVE-2023/CVE-2023-50xx/CVE-2023-5078.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-5078",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-11-08T22:15:11.957",
|
||||
"lastModified": "2023-11-08T22:15:11.957",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was reported in some ThinkPad BIOS that could allow a physical or local attacker with elevated privileges to tamper with BIOS firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-665"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.lenovo.com/us/en/product_security/LEN-141775",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-50xx/CVE-2023-5079.json
Normal file
55
CVE-2023/CVE-2023-50xx/CVE-2023-5079.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-5079",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-11-08T22:15:12.133",
|
||||
"lastModified": "2023-11-08T22:15:12.133",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Lenovo LeCloud App improper input validation allows attackers to access arbitrary components and arbitrary file downloads, which could result in information disclosure.\n\n\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://iknow.lenovo.com.cn/detail/418253?",
|
||||
"source": "psirt@lenovo.com"
|
||||
}
|
||||
]
|
||||
}
|
91
README.md
91
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-11-08T21:00:18.929967+00:00
|
||||
2023-11-08T23:00:19.943975+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-11-08T21:00:01.197000+00:00
|
||||
2023-11-08T22:59:54.747000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,54 +29,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
230158
|
||||
230179
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `21`
|
||||
|
||||
* [CVE-2023-47181](CVE-2023/CVE-2023-471xx/CVE-2023-47181.json) (`2023-11-08T19:15:08.057`)
|
||||
* [CVE-2023-47190](CVE-2023/CVE-2023-471xx/CVE-2023-47190.json) (`2023-11-08T19:15:08.137`)
|
||||
* [CVE-2023-47223](CVE-2023/CVE-2023-472xx/CVE-2023-47223.json) (`2023-11-08T19:15:08.540`)
|
||||
* [CVE-2023-47226](CVE-2023/CVE-2023-472xx/CVE-2023-47226.json) (`2023-11-08T19:15:09.023`)
|
||||
* [CVE-2023-47227](CVE-2023/CVE-2023-472xx/CVE-2023-47227.json) (`2023-11-08T19:15:09.377`)
|
||||
* [CVE-2023-47228](CVE-2023/CVE-2023-472xx/CVE-2023-47228.json) (`2023-11-08T19:15:09.497`)
|
||||
* [CVE-2023-47229](CVE-2023/CVE-2023-472xx/CVE-2023-47229.json) (`2023-11-08T19:15:09.563`)
|
||||
* [CVE-2023-47231](CVE-2023/CVE-2023-472xx/CVE-2023-47231.json) (`2023-11-08T19:15:09.633`)
|
||||
* [CVE-2023-26221](CVE-2023/CVE-2023-262xx/CVE-2023-26221.json) (`2023-11-08T20:15:07.313`)
|
||||
* [CVE-2023-5996](CVE-2023/CVE-2023-59xx/CVE-2023-5996.json) (`2023-11-08T20:15:07.637`)
|
||||
* [CVE-2023-0392](CVE-2023/CVE-2023-03xx/CVE-2023-0392.json) (`2023-11-08T21:15:08.353`)
|
||||
* [CVE-2023-29974](CVE-2023/CVE-2023-299xx/CVE-2023-29974.json) (`2023-11-08T21:15:08.447`)
|
||||
* [CVE-2023-45857](CVE-2023/CVE-2023-458xx/CVE-2023-45857.json) (`2023-11-08T21:15:08.550`)
|
||||
* [CVE-2023-45875](CVE-2023/CVE-2023-458xx/CVE-2023-45875.json) (`2023-11-08T21:15:08.587`)
|
||||
* [CVE-2023-46362](CVE-2023/CVE-2023-463xx/CVE-2023-46362.json) (`2023-11-08T21:15:08.633`)
|
||||
* [CVE-2023-46363](CVE-2023/CVE-2023-463xx/CVE-2023-46363.json) (`2023-11-08T21:15:08.673`)
|
||||
* [CVE-2023-36667](CVE-2023/CVE-2023-366xx/CVE-2023-36667.json) (`2023-11-08T22:15:08.983`)
|
||||
* [CVE-2023-43567](CVE-2023/CVE-2023-435xx/CVE-2023-43567.json) (`2023-11-08T22:15:09.200`)
|
||||
* [CVE-2023-43568](CVE-2023/CVE-2023-435xx/CVE-2023-43568.json) (`2023-11-08T22:15:09.473`)
|
||||
* [CVE-2023-43569](CVE-2023/CVE-2023-435xx/CVE-2023-43569.json) (`2023-11-08T22:15:09.820`)
|
||||
* [CVE-2023-43570](CVE-2023/CVE-2023-435xx/CVE-2023-43570.json) (`2023-11-08T22:15:10.113`)
|
||||
* [CVE-2023-47109](CVE-2023/CVE-2023-471xx/CVE-2023-47109.json) (`2023-11-08T22:15:10.423`)
|
||||
* [CVE-2023-47111](CVE-2023/CVE-2023-471xx/CVE-2023-47111.json) (`2023-11-08T22:15:10.657`)
|
||||
* [CVE-2023-47113](CVE-2023/CVE-2023-471xx/CVE-2023-47113.json) (`2023-11-08T22:15:10.843`)
|
||||
* [CVE-2023-47114](CVE-2023/CVE-2023-471xx/CVE-2023-47114.json) (`2023-11-08T22:15:11.023`)
|
||||
* [CVE-2023-4632](CVE-2023/CVE-2023-46xx/CVE-2023-4632.json) (`2023-11-08T22:15:11.210`)
|
||||
* [CVE-2023-4706](CVE-2023/CVE-2023-47xx/CVE-2023-4706.json) (`2023-11-08T22:15:11.420`)
|
||||
* [CVE-2023-4891](CVE-2023/CVE-2023-48xx/CVE-2023-4891.json) (`2023-11-08T22:15:11.593`)
|
||||
* [CVE-2023-5075](CVE-2023/CVE-2023-50xx/CVE-2023-5075.json) (`2023-11-08T22:15:11.770`)
|
||||
* [CVE-2023-5078](CVE-2023/CVE-2023-50xx/CVE-2023-5078.json) (`2023-11-08T22:15:11.957`)
|
||||
* [CVE-2023-5079](CVE-2023/CVE-2023-50xx/CVE-2023-5079.json) (`2023-11-08T22:15:12.133`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `50`
|
||||
Recently modified CVEs: `44`
|
||||
|
||||
* [CVE-2023-46931](CVE-2023/CVE-2023-469xx/CVE-2023-46931.json) (`2023-11-08T19:36:49.673`)
|
||||
* [CVE-2023-5516](CVE-2023/CVE-2023-55xx/CVE-2023-5516.json) (`2023-11-08T19:40:16.980`)
|
||||
* [CVE-2023-46930](CVE-2023/CVE-2023-469xx/CVE-2023-46930.json) (`2023-11-08T19:41:01.493`)
|
||||
* [CVE-2023-46911](CVE-2023/CVE-2023-469xx/CVE-2023-46911.json) (`2023-11-08T19:46:29.690`)
|
||||
* [CVE-2023-4197](CVE-2023/CVE-2023-41xx/CVE-2023-4197.json) (`2023-11-08T19:47:53.387`)
|
||||
* [CVE-2023-5857](CVE-2023/CVE-2023-58xx/CVE-2023-5857.json) (`2023-11-08T19:49:02.230`)
|
||||
* [CVE-2023-5858](CVE-2023/CVE-2023-58xx/CVE-2023-5858.json) (`2023-11-08T19:50:07.920`)
|
||||
* [CVE-2023-4198](CVE-2023/CVE-2023-41xx/CVE-2023-4198.json) (`2023-11-08T19:53:36.713`)
|
||||
* [CVE-2023-2622](CVE-2023/CVE-2023-26xx/CVE-2023-2622.json) (`2023-11-08T20:02:14.737`)
|
||||
* [CVE-2023-5859](CVE-2023/CVE-2023-58xx/CVE-2023-5859.json) (`2023-11-08T20:05:41.180`)
|
||||
* [CVE-2023-43798](CVE-2023/CVE-2023-437xx/CVE-2023-43798.json) (`2023-11-08T20:12:42.660`)
|
||||
* [CVE-2023-5856](CVE-2023/CVE-2023-58xx/CVE-2023-5856.json) (`2023-11-08T20:22:24.560`)
|
||||
* [CVE-2023-5855](CVE-2023/CVE-2023-58xx/CVE-2023-5855.json) (`2023-11-08T20:23:09.507`)
|
||||
* [CVE-2023-2621](CVE-2023/CVE-2023-26xx/CVE-2023-2621.json) (`2023-11-08T20:24:04.207`)
|
||||
* [CVE-2023-5853](CVE-2023/CVE-2023-58xx/CVE-2023-5853.json) (`2023-11-08T20:24:29.763`)
|
||||
* [CVE-2023-5854](CVE-2023/CVE-2023-58xx/CVE-2023-5854.json) (`2023-11-08T20:25:00.897`)
|
||||
* [CVE-2023-5851](CVE-2023/CVE-2023-58xx/CVE-2023-5851.json) (`2023-11-08T20:26:04.193`)
|
||||
* [CVE-2023-5897](CVE-2023/CVE-2023-58xx/CVE-2023-5897.json) (`2023-11-08T20:26:14.077`)
|
||||
* [CVE-2023-5852](CVE-2023/CVE-2023-58xx/CVE-2023-5852.json) (`2023-11-08T20:32:39.500`)
|
||||
* [CVE-2023-1715](CVE-2023/CVE-2023-17xx/CVE-2023-1715.json) (`2023-11-08T20:33:18.587`)
|
||||
* [CVE-2023-5482](CVE-2023/CVE-2023-54xx/CVE-2023-5482.json) (`2023-11-08T20:35:15.857`)
|
||||
* [CVE-2023-5480](CVE-2023/CVE-2023-54xx/CVE-2023-5480.json) (`2023-11-08T20:36:31.260`)
|
||||
* [CVE-2023-5849](CVE-2023/CVE-2023-58xx/CVE-2023-5849.json) (`2023-11-08T20:37:10.247`)
|
||||
* [CVE-2023-5850](CVE-2023/CVE-2023-58xx/CVE-2023-5850.json) (`2023-11-08T20:40:09.197`)
|
||||
* [CVE-2023-4393](CVE-2023/CVE-2023-43xx/CVE-2023-4393.json) (`2023-11-08T20:56:59.690`)
|
||||
* [CVE-2019-15656](CVE-2019/CVE-2019-156xx/CVE-2019-15656.json) (`2023-11-08T22:48:35.667`)
|
||||
* [CVE-2020-15892](CVE-2020/CVE-2020-158xx/CVE-2020-15892.json) (`2023-11-08T22:49:01.097`)
|
||||
* [CVE-2020-15893](CVE-2020/CVE-2020-158xx/CVE-2020-15893.json) (`2023-11-08T22:49:34.427`)
|
||||
* [CVE-2020-15894](CVE-2020/CVE-2020-158xx/CVE-2020-15894.json) (`2023-11-08T22:49:55.577`)
|
||||
* [CVE-2020-15895](CVE-2020/CVE-2020-158xx/CVE-2020-15895.json) (`2023-11-08T22:50:33.587`)
|
||||
* [CVE-2020-25078](CVE-2020/CVE-2020-250xx/CVE-2020-25078.json) (`2023-11-08T22:50:55.380`)
|
||||
* [CVE-2021-27248](CVE-2021/CVE-2021-272xx/CVE-2021-27248.json) (`2023-11-08T22:51:28.047`)
|
||||
* [CVE-2021-27249](CVE-2021/CVE-2021-272xx/CVE-2021-27249.json) (`2023-11-08T22:53:23.047`)
|
||||
* [CVE-2021-27250](CVE-2021/CVE-2021-272xx/CVE-2021-27250.json) (`2023-11-08T22:58:36.643`)
|
||||
* [CVE-2022-41723](CVE-2022/CVE-2022-417xx/CVE-2022-41723.json) (`2023-11-08T22:15:07.997`)
|
||||
* [CVE-2022-43619](CVE-2022/CVE-2022-436xx/CVE-2022-43619.json) (`2023-11-08T22:58:53.827`)
|
||||
* [CVE-2022-43620](CVE-2022/CVE-2022-436xx/CVE-2022-43620.json) (`2023-11-08T22:59:10.643`)
|
||||
* [CVE-2022-43621](CVE-2022/CVE-2022-436xx/CVE-2022-43621.json) (`2023-11-08T22:59:29.767`)
|
||||
* [CVE-2022-43622](CVE-2022/CVE-2022-436xx/CVE-2022-43622.json) (`2023-11-08T22:59:54.747`)
|
||||
* [CVE-2023-0001](CVE-2023/CVE-2023-00xx/CVE-2023-0001.json) (`2023-11-08T21:15:08.247`)
|
||||
* [CVE-2023-21930](CVE-2023/CVE-2023-219xx/CVE-2023-21930.json) (`2023-11-08T22:15:08.117`)
|
||||
* [CVE-2023-21937](CVE-2023/CVE-2023-219xx/CVE-2023-21937.json) (`2023-11-08T22:15:08.247`)
|
||||
* [CVE-2023-21938](CVE-2023/CVE-2023-219xx/CVE-2023-21938.json) (`2023-11-08T22:15:08.343`)
|
||||
* [CVE-2023-21939](CVE-2023/CVE-2023-219xx/CVE-2023-21939.json) (`2023-11-08T22:15:08.440`)
|
||||
* [CVE-2023-21954](CVE-2023/CVE-2023-219xx/CVE-2023-21954.json) (`2023-11-08T22:15:08.540`)
|
||||
* [CVE-2023-21967](CVE-2023/CVE-2023-219xx/CVE-2023-21967.json) (`2023-11-08T22:15:08.630`)
|
||||
* [CVE-2023-21968](CVE-2023/CVE-2023-219xx/CVE-2023-21968.json) (`2023-11-08T22:15:08.750`)
|
||||
* [CVE-2023-2033](CVE-2023/CVE-2023-20xx/CVE-2023-2033.json) (`2023-11-08T22:15:08.880`)
|
||||
* [CVE-2023-38994](CVE-2023/CVE-2023-389xx/CVE-2023-38994.json) (`2023-11-08T22:15:09.033`)
|
||||
* [CVE-2023-3079](CVE-2023/CVE-2023-30xx/CVE-2023-3079.json) (`2023-11-08T22:15:09.110`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user